US6079020A - Method and apparatus for managing a virtual private network - Google Patents
Method and apparatus for managing a virtual private network Download PDFInfo
- Publication number
- US6079020A US6079020A US09/013,743 US1374398A US6079020A US 6079020 A US6079020 A US 6079020A US 1374398 A US1374398 A US 1374398A US 6079020 A US6079020 A US 6079020A
- Authority
- US
- United States
- Prior art keywords
- command
- virtual private
- private network
- network
- configuration parameters
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Lifetime
Links
- 238000000034 method Methods 0.000 title claims abstract description 36
- 238000004891 communication Methods 0.000 claims abstract description 79
- 230000004931 aggregating effect Effects 0.000 claims description 2
- 230000003190 augmentative effect Effects 0.000 abstract description 2
- 238000010586 diagram Methods 0.000 description 11
- 230000006835 compression Effects 0.000 description 9
- 238000007906 compression Methods 0.000 description 9
- 230000007246 mechanism Effects 0.000 description 6
- 238000012545 processing Methods 0.000 description 5
- 230000008520 organization Effects 0.000 description 4
- 230000008569 process Effects 0.000 description 4
- 238000012986 modification Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 230000000644 propagated effect Effects 0.000 description 2
- 238000012546 transfer Methods 0.000 description 2
- 235000008694 Humulus lupulus Nutrition 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 230000001427 coherent effect Effects 0.000 description 1
- 239000000470 constituent Substances 0.000 description 1
- 238000009826 distribution Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000001914 filtration Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/22—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks comprising specially adapted graphical user interfaces [GUI]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04Q—SELECTING
- H04Q3/00—Selecting arrangements
- H04Q3/0016—Arrangements providing connection between exchanges
- H04Q3/0029—Provisions for intelligent networking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/40—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using virtualisation of network functions or resources, e.g. SDN or NFV entities
Definitions
- the present invention relates to the field of data communication. More specifically, the present invention relates to techniques for managing secure virtual private networks over public or otherwise insecure data communication infrastructures.
- Preventing unauthorized access to data traversing an enterprise's LAN is relatively straightforward. As long as intelligent network management is maintained, unauthorized accesses to data traversing an enterprise's internal LAN can be prevented. It is when the enterprise spans multiple sites that security threats from the outside become a considerable problem.
- the first option is to interconnect the offices or various sites with dedicated, or private, communication connections often referred to as leased lines.
- This is the traditional method that organizations use to implement a wide area network (WAN).
- WAN wide area network
- the disadvantages of implementing an enterprise-owned and controlled WAN are obvious: they are expensive, cumbersome and frequently underutilized if they are configured to handle the peak capacity requirements of the enterprise.
- the obvious advantage is that the lines are dedicated for use by the enterprise and are therefore reasonably secure from eavesdropping or tampering by intermediate third parties.
- An alternative to dedicated communication lines is for an enterprise to handle inter-site data distributions over the emerging public network space.
- the Internet has evolved from being primarily a tool for scientists and academics into an efficient mechanism for global communications.
- the Internet provides electronic communications paths between millions of computers by interconnecting the various networks upon which those computers reside. It has become commonplace, even routine, for enterprises, even those in non-technical fields, to provide Internet access to at least some portion of the computers within the enterprises. For many businesses this facilitates communications with customers and potential business partners as well as to geographically distributed members of the organization.
- ISP Internet Service Provider
- ISP Internet Service Provider
- a large disadvantage of using the Internet for intra-enterprise communications is that the Internet is a public network. The route by which data communication travel from point to point can vary on a per packet basis, and is essentially indeterminate.
- the data protocols for transmitting information over the constituent networks of the Internet are widely known, leaving electronic communications susceptible to interception and eavesdropping with packets being replicated at most intermediate hops.
- VPNs virtual private networks
- Virtual private network systems often rely on virtual private network gateways, which reside on the WAN side of a routing apparatus to connect an enterprise site to the Internet.
- VPN gateways are in the path of all relevant data traffic between an enterprise site and the public network.
- a VPN gateway implements a combination of techniques for data communication between members of the VPN group. These techniques include various combinations of compression, encryption and authentication, the rules for each of which may vary for members of different groups.
- VPN gateways which are geographically distributed throughout a public network, can be a time-consuming and error-prone task.
- VPN gateways Each time a VPN is modified, VPN gateways must be reconfigured to reflect the modifications. This reconfiguration can be performed remotely across the public network from a central site. Hence, it is not necessary to physically travel to the remote site. Nevertheless, this process is time-consuming because each VPN gateway must presently be reconfigured with network address information specifying which communications are to be transmitted securely, and which ones are not.
- a VPN administrator receives a policy to implement, such as modifying a VPN.
- the administrator determines which groups of network nodes, and which VPN gateways, are involved in the policy.
- the VPN administrator then manually determines for each VPN gateway, what type of configuration information must be transmitted to the VPN gateway to implement the policy.
- This configuration information typically includes network address information.
- the configuration information must be explicitly propagated to the VPN gateways.
- a VPN administrator must presently enter this configuration information manually, which can be a time-consuming task. Furthermore, it is very easy to make mistakes in translating a policy into network address specifications, and in entering the long strings of number that make up network address specifications. Such mistakes can cause improper configuration of network gateways, thereby potentially creating a security hole. Additionally, this configuration information is typically transmitted insecurely over the public network to the VPN gateways. Hence, this information can potentially be intercepted by third parties listening in on network traffic.
- the present invention provides a method and an apparatus for managing a virtual private network operating over a public data network.
- This public data network has been augmented to include a plurality of virtual private network gateways so that communications across the virtual private network are channeled through the virtual private network gateways.
- One embodiment of the present invention includes a system that operates by receiving a command specifying an operation on the virtual private network. The system determines which virtual private network gateways are affected by the command. The system then automatically translates the command into configuration parameters for virtual private network gateways affected by the command. These configuration parameters specifying how the virtual private network gateways handle communications between specific groups of addresses on the public data network. The system then transmits the configuration parameters to the virtual private network gateways affected by the command, so that the virtual private network gateways are configured to implement the command.
- the system receives the configuration parameters at the VPN gateway.
- the system uses these configuration parameters to determine whether the source and destination addresses of a communication between nodes in the public data network belong to the same virtual private network. If the source and destination addresses belong to the same virtual private network, the system ensures that the communication is transmitted securely over the public data network.
- the VPN gateways are managed by a central VPN management station coupled to the public data network.
- One embodiment of the present invention includes a number of different VPN management commands, including commands to create a VPN, to modify a VPN and to delete a VPN.
- the configuration parameters include specific groups of addresses between which communications are to be transmitted securely.
- the configuration parameters include Internet Protocol (IP) addresses.
- IP Internet Protocol
- translating the command into configuration parameters includes aggregating address specifications for groups of nodes involved in the command. It also includes creating configuration parameters by determining, for each virtual private network gateway affected by the command, which address specifications specify local addresses on the local network, and which address specifications specify non-local addresses.
- the configuration parameters are transmitted securely over the public data network to the VPN gateways.
- a database is updated to reflect changes on the VPN.
- the VPN gateways handle communications between remote clients coupled to the public data network through an internet service provider (ISP).
- ISP internet service provider
- FIG. 1 illustrates a public network 100 including VPN gateways 115, 125, 135, 145, and 155 operating under control of a VPN management station 160 in accordance with an embodiment of the present invention.
- FIG. 2 is a flow chart illustrating the processing of a packet being transmitted from one member of a VPN to another member of the VPN over a public data network in accordance with an embodiment of the present invention.
- FIG. 3 is a flow chart illustrating the processing of a packet being received over a public data network by one member of a VPN from another member of the VPN in accordance with an embodiment of the present invention.
- FIG. 4 is a block diagram illustrating part of the internal structure of VPN management station 160 in accordance with an embodiment of the present invention.
- FIG. 5 is a block diagram of part of the software architecture contained within VPN management station 160 in accordance with an embodiment of the present invention.
- FIG. 6 is a diagram of some of the data objects operated on by high-level commands in accordance with an embodiment of the present invention.
- FIG. 7 is a listing of some of the operations specified by high-level commands and performed on the data objects illustrated in FIG. 6 in accordance with an embodiment of the present invention.
- FIG. 8 is a flow chart illustrating some of the operations performed by a VPN system manager to create a VPN in accordance with an embodiment of the present invention.
- FIG. 9 is a flow chart illustrating some of the operations performed by VPN management station 160 in order to create a VPN in accordance with an embodiment of the present invention.
- FIG. 10 is a flow chart illustrating some of the operations performed by VPN management station 160 in order to add a group to a VPN in accordance with an embodiment of the present invention.
- FIG. 11 is a flow chart illustrating some of the operations performed by VPN management station 160 in order to create a group in accordance with an embodiment of the present invention.
- FIG. 12 is a block diagram illustrating how secure communication of configuration information is implemented in the context of system communication layers in accordance with an embodiment of the present invention.
- FIG. 13 is a block diagram illustrating another view of the software architecture contained within VPN management station 160 in accordance with an embodiment of the present invention.
- Group of Nodes--a group of nodes on a public network In one variation, these nodes belong to the same local network. In another variation, these nodes are specified by at least one net/mask pair.
- Local Network--an enterprise network (or a local network) separated from a public data network by a VPN gateway.
- Net/Mask Pair--a specification for a group of network addresses including a network ID and a network address mask.
- Non-local Address--an address on a different enterprise network wherein enterprise networks are separated from a public data network by a VPN gateway.
- the present invention is not limited to any one particular implementation technique. Those of ordinary skill in the art will be able to implement the invention with various technologies without undue experimentation once the functionality to be carried out by such components is described. In many instances, components implemented by the present invention are described at an architectural, functional level. Many of the elements may be configured using well-known structures, particularly those designated as relating to various compression or encryption techniques. Additionally, for logic to be included within the system of the present invention, functionality and flow diagrams are described in such a manner that those of ordinary skill in the art will be able to implement the particular methods without undue experimentation. It should also be understood that the techniques of the present invention may be implemented using a variety of technologies. For example, the VPN gateway to be described further herein may be implemented in software running on a computer system, or implemented in hardware utilizing either a combination of microprocessors or other specially designed application specific integrated circuits, programmable logic devices, or various combinations thereof.
- FIG. 1 illustrates a public network 100 including VPN gateways 115, 125, 135, 145, and 155 operating under control of a VPN management station 160 in accordance with an embodiment of the present invention.
- Public network 100 may be any type of communication channel, including, but not limited to, data networks such as the Internet.
- VPN gateway 115 couples headquarters local area network (LAN) 110 to public network 100 through router 114.
- Headquarters LAN 110 is illustrated with three endstations 111, 112, and 113, respectively coupled to headquarters LAN 110.
- VPN gateway 125 couples Branch LAN 120 to public network 100 through router 124.
- Branch LAN 120 is shown having a plurality of endstations 211, 212 and 213, respectively, coupled to branch LAN 120.
- VPN gateway 135 couples partner/customer LAN 130 to public network 100 through router 134.
- Partner/customer LAN 130 is illustrated in FIG. 1 as comprising of plurality of computers, 131 and 132, coupled to communicate data packets over the partner/customer LAN 130.
- the local area networks utilized for data communications within the headquarters, customer and branch sites may adhere to a wide variety of network protocols, the most common of which are Ethernet and Token Ring.
- VPN gateways 145 and 155 couple remote clients 140 and 150, respectively, to public network 100.
- Remote clients are systems coupled to public network 100 from remote locations. It is frequently desirable for other members of the enterprise who may be on the road or working from home or other remote locations to exchange data with other members of the enterprise.
- remote clients 140 and 150 may communication with the headquarters LAN 110 over long distance telephone lines.
- remote clients 140 and 150 may have local access to public network 100 through local Internet service providers (ISPs).
- ISPs Internet service providers
- VPN gateways 145 and 155 are implemented as hardware modules.
- VPN gateways 145 and 155 are implemented as software modules within remote clients 140 and 150, respectively.
- VPN management station 160 controls VPN gateways 115, 125, and 135 through commands and configuration information transmitted to VPN gateways 115, 125 and 135 through public network 100.
- VPN management station 160 may be implemented in software running on a computer system, or alternatively may be implemented in hardware utilizing either a combination of microprocessors or other specially designed application specific integrated circuits, programmable logic devices, or various combinations thereof. The structure of VPN management station 160 is described in more detail below with reference to FIGS. 4 and 5.
- Each of the LANs for the particular sites illustrated in FIG. 1 ultimately connect to the public network 100 through associated routing or gateway devices, which are identified as routers 114, 124 and 134, respectively.
- Data packets conveyed between the various sites illustrated in FIG. 1 generally traverse a plurality of additional routing devices on their way between the source and destination sites for the packets.
- the mechanisms for data packet transfers over a public network 100, such as the Internet are well known and are not described in great detail herein.
- packets are assembled in accordance with the Internet Protocol (IP) and are referred to herein as IP packets regardless of the version of the Internet protocol presently in effect.
- IP Internet Protocol
- VPN gateways in the overall system architecture represents only one placement choice. Other configurations are possible. The only requirement is that the VPN gateways reside in the path of data traffic. In another embodiment, the VPN gateway is located on the LAN side of a site's router. VPN gateways maintain lookup tables for identifying members of specific virtual private network groups.
- VPN gateways 145 and 155 may be implemented in software, which operates in conjunction with the communication software for connecting the remote client to its associated Internet Service Provider (ISP).
- ISP Internet Service Provider
- FIG. 2 is a flow chart illustrating the processing of a packet being transmitted from one member of a VPN to another member of the VPN over a public data network in accordance with an embodiment of the present invention.
- a data packet originates from an endstation, such as endstation 112 of LAN 110, and it is destined for a remote site, outside of LAN 110, the packet is initially be treated as an ordinary Internet data packet.
- the packet proceeds from endstation 112 over LAN 110 to the routing device 114, which encapsulates the data packet in accordance with the Internet Protocol, forming an outbound IP packet.
- the IP packet passes through the associated VPN gateway 115 for the site.
- the flowchart illustrated at FIG. 3 shows how a VPN gateway processes an outbound packet.
- the transmit procedure 200 begins when the outbound data packet is received at the VPN gateway in state 210.
- the system determines whether or not the source and destination addresses for the data packet are both members of the same VPN group. This determination may be made with reference to lookup tables that are maintained by the VPN gateways or by referencing to other memory mechanisms. This state may be thought of as member filtering for data packets being transmitted between the particular site and the VPN gateway which services it. If the source and destination address for the data packet are not both members of the same VPN group, then at state 230 the packet is forwarded to the Internet as ordinary Internet traffic from the site, as though the VPN gateway were not involved. In this case, the system proceeds to state 260, which is an end state. In an alternative embodiment, the system discards data traffic that is not between members of a VPN group rather than forwarding it as unsecure traffic. In another embodiment, the system provides the option to either pass or discard non-VPN group data traffic.
- the system determines that both the source and destination addresses for the data packet are members of the same VPN group, the data packet is processed at state 240 undergoing various combinations of compression, encryption and authentication.
- Lookup tables maintained by the VPN gateway 115 and all of the VPN units identify members of particular VPN groups. They additionally identify whether or not data packets transferred between members of the particular VPN group are to be compressed, and if so, what algorithm is used for compression. Many possible compression algorithms are well known, but in one embodiment of the invention, LZW compression is used.
- the lookup table for the VPN group, of which the source and destination addresses are members also identifies the particular encryption algorithm used for data packets traversing the Internet for the VPN group.
- the lookup table additionally identifies the authentication and the key management protocol information which is used.
- the VPN gateway may be programmed to always use the same algorithms for all VPN groups.
- the particular packet processing algorithms to be used for VPN traffic may vary, so long as the lookup tables in both the sending and receiving VPN units identify the same compression, encryption and authentication rules and are capable of implementing them for members of the same group.
- a single VPN gateway may serve multiple VPN groups, and that particular network addresses may be members of multiple groups.
- the packet is processed according to the compression, encryption and authentication rules identified in the VPN gateway tables for that particular VPN group. Then, at state 250, the processed packet is forwarded toward the destination address over the Internet.
- the sending procedure ends at state 260.
- FIG. 3 is a flow chart illustrating the processing of a packet being received over a public data network by one member of a VPN from another member of the VPN in accordance with an embodiment of the present invention.
- This packet receiving procedure 300 begins at state 310 when an inbound data packet is received from the Internet at the receiving VPN gateway.
- decision box 320 the inbound data packet is examined to determine if the source and destination addresses of the data packet are both members of the same VPN group. (It is assumed that the lookup tables maintained by all of the VPN units are both consistent and coherent.) If the inbound data packet is determined not to be VPN traffic, then the packet is passed through and forwarded to the receiving site as though it were normal Internet data traffic at state 330. The system then proceeds to state 360, which is an end state. In an alternative embodiment, the system discards incoming data traffic that is not from an identified member of a VPN group supported by the VPN gateway.
- the VPN gateway For data packets that are determined to be VPN traffic at decision box 320, the VPN gateway processes the inbound packet to recover the original data packet as it was provided from the source endstation.
- the lookup table maintained by the receiving VPN gateway identifies the compression, encryption and authentication rules used for the VPN group and reconstructs the original IP packet in accordance with those rules at state 340. Then, the reconstructed packet will be delivered to the site of the destination address at state 360. The system then proceeds to state 360, which is an end state.
- FIG. 4 is a block diagram illustrating part of the internal structure of VPN management station 160 in accordance with an embodiment of the present invention.
- VPN management station 160 may be any type of computational system coupled to public network 100.
- VPN management station 160 includes processor 400 coupled to memory 402, storage unit 405 and network interface card 408 through bus 401.
- Memory 402 includes VPN management code 404, which contains instructions and data to manage VPN gateways coupled to network 100.
- Storage unit 405 includes database 406, which includes information reflecting the structure of virtual private networks supported by the system as well as the configuration of the VPN gateways supported by VPN management station 160.
- Network interface card 408 couples VPN management station 160 to network 100. The operations performed by VPN management station 160 are discussed in more detail below.
- FIG. 5 is a block diagram of part of the software architecture contained within VPN management station 160 in accordance with an embodiment of the present invention.
- VPN management station 160 includes VPN management code 404 in memory 402 and VPN database 406 on storage unit 405.
- VPN management code 404 includes user interface presenter 500, which receives input from a system user. This input feeds through error/semantics checking module 502 before feeding into command handler 506.
- Command handler 506 is coupled to dredger 504, collator 508 and communication library 510.
- Command handler 506 executes the commands received through user interface presenter 500 by manipulating dredger 504, collator 508 and communication library 510.
- Dredger 504 is coupled to and performs searches through and performs updates to VPN database 406.
- Communication library 510 contains functions to communicate with network 100.
- Collator 508 sorts and manipulates network addresses to produce configuration information for VPN gateways.
- a system user inputs a command into user interface presenter 500. This command feeds through error/semantics checker module 502 before arriving at command handler 506.
- Command handler 506 may present additional screens or queries to the user through user interface presenter 500.
- Command handler then retrieves information regarding the groups of nodes, VPNs and VPN gateways affected by the command.
- Command handler 506 takes this information and uses it to produce configuration information for VPN gateways using collator 508. This configuration information is communicated to the VPN gateways using functions from communication library 510, which communicate across network 100.
- FIG. 6 is a diagram of some of the data objects operated on by high-level commands in accordance with an embodiment of the present invention.
- FIG. 6 includes VPN gateway object 600, group object 610, VPN object 620 and client object 630.
- a user manipulating VPN management station 160 specifies sequences of operations on the above-listed objects. Hence, the user does not have to directly manipulate lower level addressing information to configure VPN gateways. This lower level addressing information is automatically generated by VPN management station 160 and sent to the VPN gateways.
- a VPN gateway object 600 is created for each VPN gateway in the network.
- a VPN gateway object comprises a number of parameters including the Internet Protocol (IP) address of the VPN gateway.
- IP Internet Protocol
- a group object 610 is created for groups of network nodes on public network 100.
- a group object includes an identifier for the VPN gateway associated with the group and the net/mask pairs the group defines.
- a VPN object 620 is created for each virtual private network supported by VPN management station 160.
- a VPN object 620 comprises a number of attributes including a list of groups and a list of remote clients included in the underlying VPN.
- a client object 630 is created for each remote client supported by VPN management station 160.
- a client object comprises a number of attributes including a listing of the virtual private networks the client belongs to and the NSID/MKID identifier for the remote client.
- the NSID, or name space ID is the MD5 hash of a user name
- the MKID is the master key ID of the domain.
- FIG. 7 is a listing of some of the operations performed on the data objects illustrated in FIG. 6 in accordance with an embodiment of the present invention.
- the system includes operations to add, modify and delete the four objects illustrated in FIG. 6.
- This embodiment also includes operations to generate a VPN key for security purposes and an operation to explicitly modify a VPN configuration.
- the embodiment additionally includes an operation to "ping" and VPN gateway to ensure that both the communication link to the VPN gateway and the VPN gateway are functioning.
- the embodiment additionally includes a "proxy ping" command, which causes a VPN gateway to ping a node on the network.
- FIG. 8 is a flow chart illustrating some of the operations performed by a VPN system manager to create a VPN in accordance with an embodiment of the present invention.
- the system manager starts a state 800 and proceeds to state 802.
- state 802 the system manager issues commands to create VPN gateway objects corresponding to physical VPN gateways on network 100.
- the system manager then proceeds to state 804.
- state 804 the system manager issues commands to create and define groups of network nodes.
- the system manager proceeds to state 806, in which the system manager issues a command to create a VPN object.
- the system manager then proceeds to state 808.
- state 808 the system manager adds groups to the VPN.
- the system manager proceeds to state 810, in which the system manager issues a command to apply the previous operations.
- the system manager's work is complete at this point, and the software in VPN management station 160 takes over as is described in more detail below.
- the system manager then proceeds to state 812, which is an end state.
- FIG. 9 is a flow chart illustrating some of the operations performed by VPN management station 160 in order to create a VPN in accordance with an embodiment of the present invention. In one embodiment, these operations are performed by VPN management code 404 in VPN management station 160.
- the system starts in state 900 and proceeds to state 902.
- state 902 the system gets the current VPN object, which is the subject of the VPN creation command.
- the system proceeds to state 904.
- state 904 the system gets a list of groups involved in the command, in other words the groups to be included in the VPN.
- the system then proceeds to state 906.
- state 906 the system gets a list of all VPN gateways involved in the command by examining the appropriate fields in the VPN group objects.
- the system then proceeds to state 908.
- state 908 the system aggregates network/mask pairs for all groups involved in the operations.
- Network mask pairs specify networks and address masks to specify a group.
- the system then proceeds to state 910.
- state 910 the system performs a collation operation to create configuration information for the VPN gateways. This involves the following. For each VPN gateway, the system determines which net/mask pairs are on the local enterprise network or LAN and which net/mask pairs are remote. This configuration information allows each VPN gateway to determine which communications are to be encrypted, and which communications are not to be encrypted.
- state 912 the system sends the configuration to the appropriate VPN gateways so that the VPN gateways can be configured to implement the VPN.
- state 914 which is an end state.
- FIG. 10 is a flow chart illustrating some of the operations performed by VPN management station 160 in order to add a group to a VPN in accordance with an embodiment of the present invention.
- the system starts in state 1000 and proceeds to state 1002.
- state 1002 the system displays a VPN configuration page to the VPN system manager.
- the system then proceeds to state 1004.
- state 1004 the system gets user input from the VPN system manager.
- state 1006 the system lists all groups to be added to the VPN.
- the system then proceeds to state 1008.
- state 1008 the system gets a listing of the net/mask pairs for each group.
- the system then proceeds to state 1010.
- the system determines which VPN gateway is guarding each group, and the VPN gateway's IP address.
- the system then proceeds to state 1012.
- state 1012 the system collates net/mask pairs for each gateway. The system then proceeds to state 1014. In state 1014, the system sends the configuration information to the VPN gateways across public network 100. The system then proceeds to state 1016, which is an end state.
- FIG. 11 is a flow chart illustrating some of the operations performed by VPN management station 160 in order to create a group in accordance with an embodiment of the present invention.
- the system starts in state 1100 and proceeds to state 1102.
- state 1102 the system receives a command to create a group from a VPN system administrator. The system then proceeds to state 1104.
- state 1104 the system determines whether or not the name of the new group already exists. If so, the system proceeds to state 1106 in which the system handles the error and then proceeds to state 1112, which is an end state. If not, the system proceeds to state 1106.
- state 1106 the system instantiates a group object. The system then proceeds to state 1108.
- state 1108 the system displays a group configuration page. The system then proceeds to state 1110.
- state 1110 the system configures the group with user input entered into the configuration page. The system then proceeds to state 1112, which is an end state.
- FIG. 12 is a block diagram illustrating how secure communication of configuration information from VPN management station 160 to VPN gateways is implemented in the context of system communication layers in accordance with an embodiment of the present invention.
- FIG. 12 illustrates the communication layers involved in communicating with an Internet browser.
- One embodiment of the present invention provides security for communications between VPN management station 160 and VPN gateways by utilizing the security features that already exist in for Internet browsers. More specifically, HTML code 1202 is replaced with virtual private network code 1212. Virtual private network code 1212 is then able to communicate through the existing security mechanisms for the browser.
- VPN code 1212 (which replaced HTML code 1202) talks to HTTPS layer 1204, which is a secure version of HTTP.
- HTTPS layer 1204 talks to secure sockets layer (SSL) 1206.
- SSL secure sockets layer
- TCP layer 1208 talks to Internet Protocol (IP) layer 1210, which sends communications across public network 100.
- IP Internet Protocol
- FIG. 13 is a block diagram illustrating another view of the software architecture contained within VPN management station 160 in accordance with an embodiment of the present invention.
- the software to manage the VPN gateways is contained within browser 1300.
- the main VPN logic resides within applets 1302, which communicate with communications library 1304 and database server 1308.
- Database server 1308 is coupled to database 1310.
- Communications library 1304 is itself comprised of applets, which facilitate communications to VPN gateways, such as VPN gateway 125.
- These communications pass through Java Runtime Environment (JRE) 1306, which implements security in the SSL layer 1206.
- JRE Java Runtime Environment
- communications across public network 100 to VPN gateways present a vulnerable link because the communications take place on a physical wire that is susceptible to snooping and spoofing.
- one embodiment of the present invention protects data using SSL v2.
- communications of configuration information to VPN gateways precedes communications to database 1310 in order to ensure that the configuration information is properly committed to the VPN gateways before committing the corresponding changes to database 1310.
Abstract
Description
Claims (22)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/013,743 US6079020A (en) | 1998-01-27 | 1998-01-27 | Method and apparatus for managing a virtual private network |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/013,743 US6079020A (en) | 1998-01-27 | 1998-01-27 | Method and apparatus for managing a virtual private network |
Publications (1)
Publication Number | Publication Date |
---|---|
US6079020A true US6079020A (en) | 2000-06-20 |
Family
ID=21761516
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/013,743 Expired - Lifetime US6079020A (en) | 1998-01-27 | 1998-01-27 | Method and apparatus for managing a virtual private network |
Country Status (1)
Country | Link |
---|---|
US (1) | US6079020A (en) |
Cited By (221)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2001004759A1 (en) * | 1999-07-14 | 2001-01-18 | Recourse Technologies, Inc. | System and method for computer security |
US6205488B1 (en) * | 1998-11-13 | 2001-03-20 | Nortel Networks Limited | Internet protocol virtual private network realization using multi-protocol label switching tunnels |
US6247052B1 (en) * | 1997-12-23 | 2001-06-12 | Alcatel Usa Sourcing, L.P. | Graphic user interface system for a telecommunications switch management system |
US20010025301A1 (en) * | 2000-02-09 | 2001-09-27 | Anderson Keith R. | Packet prioritization protocol for a large-scale, high speed computer network |
WO2001082097A1 (en) * | 2000-04-27 | 2001-11-01 | Fortress Technologies, Inc. | A method and apparatus for integrating tunneling protocols with standard routing protocols |
US20020004902A1 (en) * | 2000-07-07 | 2002-01-10 | Eng-Whatt Toh | Secure and reliable document delivery |
KR20020011262A (en) * | 2000-08-01 | 2002-02-08 | 서평원 | Virtual Private Network System In Mobile Communication System |
US20020019932A1 (en) * | 1999-06-10 | 2002-02-14 | Eng-Whatt Toh | Cryptographically secure network |
US20020048372A1 (en) * | 2000-10-19 | 2002-04-25 | Eng-Whatt Toh | Universal signature object for digital data |
US20020052950A1 (en) * | 2000-12-11 | 2002-05-02 | Silverback Technologies, Inc. | Distributed network monitoring and control system |
US20020055989A1 (en) * | 2000-11-08 | 2002-05-09 | Stringer-Calvert David W.J. | Methods and apparatus for scalable, distributed management of virtual private networks |
US20020093915A1 (en) * | 2001-01-18 | 2002-07-18 | Victor Larson | Third party VPN certification |
US20020099939A1 (en) * | 2000-05-24 | 2002-07-25 | Hewlett-Packard Company | Internet key exchange |
US20020099668A1 (en) * | 2001-01-22 | 2002-07-25 | Sun Microsystems, Inc. | Efficient revocation of registration authorities |
US20020101998A1 (en) * | 1999-06-10 | 2002-08-01 | Chee-Hong Wong | Fast escrow delivery |
US20020105928A1 (en) * | 1998-06-30 | 2002-08-08 | Samir Kapoor | Method and apparatus for interference suppression in orthogonal frequency division multiplexed (OFDM) wireless communication systems |
US6434619B1 (en) * | 1998-04-29 | 2002-08-13 | Alcatel Canada Inc. | Internet-enabled service management system and method |
US6434627B1 (en) * | 1999-03-15 | 2002-08-13 | Cisco Technology, Inc. | IP network for accomodating mobile users with incompatible network addressing |
US6438127B1 (en) * | 1997-03-12 | 2002-08-20 | Mannesmann Ag | Process and apparatus for the operation of virtual private networks on a common data packet communication network |
US6442448B1 (en) * | 1999-06-04 | 2002-08-27 | Radiant Systems, Inc. | Fuel dispensing home phone network alliance (home PNA) based system |
US20020126667A1 (en) * | 2001-03-06 | 2002-09-12 | Naoki Oguchi | Packet relaying apparatus and relaying method |
US20020138635A1 (en) * | 2001-03-26 | 2002-09-26 | Nec Usa, Inc. | Multi-ISP controlled access to IP networks, based on third-party operated untrusted access stations |
FR2823389A1 (en) * | 2001-04-05 | 2002-10-11 | Schlumberger Systems & Service | High level language application downloading method for mobile phone involves replacing codes by reference to those codes to produce a compressed application |
WO2002082261A2 (en) * | 2001-04-05 | 2002-10-17 | Schlumberger Systèmes | Compression of codes of an application written in high-level language, for use in mobile telephony. |
US20020156828A1 (en) * | 2001-04-24 | 2002-10-24 | Takeshi Ishizaki | Integrated service management system |
US20020154635A1 (en) * | 2001-04-23 | 2002-10-24 | Sun Microsystems, Inc. | System and method for extending private networks onto public infrastructure using supernets |
US6493349B1 (en) * | 1998-11-13 | 2002-12-10 | Nortel Networks Limited | Extended internet protocol virtual private network architectures |
US20020199007A1 (en) * | 2001-06-12 | 2002-12-26 | Tom Clayton | Virtual private network software system |
US6502135B1 (en) * | 1998-10-30 | 2002-12-31 | Science Applications International Corporation | Agile network protocol for secure communications with assured system availability |
US20030009699A1 (en) * | 2001-06-13 | 2003-01-09 | Gupta Ramesh M. | Method and apparatus for detecting intrusions on a computer system |
US20030028650A1 (en) * | 2001-07-23 | 2003-02-06 | Yihsiu Chen | Flexible automated connection to virtual private networks |
US20030033401A1 (en) * | 1999-04-02 | 2003-02-13 | Matthew W. Poisson | Monitoring a virtual private network |
US20030046390A1 (en) * | 2000-05-05 | 2003-03-06 | Scott Ball | Systems and methods for construction multi-layer topological models of computer networks |
US20030051195A1 (en) * | 2000-05-05 | 2003-03-13 | Bosa Patrick A. | Systems and methods for isolating faults in computer networks |
US20030055933A1 (en) * | 2001-09-20 | 2003-03-20 | Takeshi Ishizaki | Integrated service management system for remote customer support |
US20030056140A1 (en) * | 2000-05-05 | 2003-03-20 | Taylor David K. | Help desk systems and methods for use with communications networks |
US20030065950A1 (en) * | 2001-09-28 | 2003-04-03 | Yarborough William Jordan | Secured FTP architecture |
US20030069958A1 (en) * | 2001-10-05 | 2003-04-10 | Mika Jalava | Virtual private network management |
US20030070091A1 (en) * | 2001-10-05 | 2003-04-10 | Loveland Shawn Domenic | Granular authorization for network user sessions |
US20030088699A1 (en) * | 1999-11-04 | 2003-05-08 | James V. Luciani | System, device, and method for supporting virtual private networks in a label switched communication network |
US6577327B1 (en) * | 1999-09-15 | 2003-06-10 | Nortel Networks Limited | System, method and graphical user interface for building virtual private networks |
US20030115480A1 (en) * | 2001-12-17 | 2003-06-19 | Worldcom, Inc. | System, method and apparatus that employ virtual private networks to resist IP QoS denial of service attacks |
EP1322070A2 (en) * | 2001-12-19 | 2003-06-25 | Alcatel Canada Inc. | System and method for managing information for elements in a communication network |
US20030126468A1 (en) * | 2001-05-25 | 2003-07-03 | Markham Thomas R. | Distributed firewall system and method |
US20030128695A1 (en) * | 2002-01-04 | 2003-07-10 | Samsung Electronics Co., Ltd. | Home gateway for executing a function of a security protocol and a method thereof |
US20030149919A1 (en) * | 2000-05-05 | 2003-08-07 | Joseph Greenwald | Systems and methods for diagnosing faults in computer networks |
US20030172264A1 (en) * | 2002-01-28 | 2003-09-11 | Hughes Electronics | Method and system for providing security in performance enhanced network |
US20030177221A1 (en) * | 2002-03-18 | 2003-09-18 | Hamid Ould-Brahim | Resource allocation using an auto-discovery mechanism for provider-provisioned layer-2 and layer-3 Virtual Private Networks |
US6636898B1 (en) * | 1999-01-29 | 2003-10-21 | International Business Machines Corporation | System and method for central management of connections in a virtual private network |
EP1355449A1 (en) * | 2002-04-17 | 2003-10-22 | France Telecom | Method and system for determining the parameters of a data transmission network for creating, in that network, a virtual private network |
US20030200321A1 (en) * | 2001-07-23 | 2003-10-23 | Yihsiu Chen | System for automated connection to virtual private networks related applications |
US6647109B1 (en) * | 2000-07-21 | 2003-11-11 | Conexant Systems, Inc. | Network telephony |
US20030212904A1 (en) * | 2000-05-25 | 2003-11-13 | Randle William M. | Standardized transmission and exchange of data with security and non-repudiation functions |
US20030217126A1 (en) * | 2002-05-14 | 2003-11-20 | Polcha Andrew J. | System and method for automatically configuring remote computer |
US20030226013A1 (en) * | 2002-05-31 | 2003-12-04 | Sri International | Methods and apparatus for scalable distributed management of wireless virtual private networks |
US6662221B1 (en) * | 1999-04-12 | 2003-12-09 | Lucent Technologies Inc. | Integrated network and service management with automated flow through configuration and provisioning of virtual private networks |
US20030233576A1 (en) * | 2002-06-13 | 2003-12-18 | Nvidia Corp. | Detection of support for security protocol and address translation integration |
US20030233450A1 (en) * | 2002-06-13 | 2003-12-18 | Carley Jeffrey Alan | Out-of-band remote management station |
US20040003116A1 (en) * | 1998-10-30 | 2004-01-01 | Science Applications International Corporation | Agile network protocol for secure communications with assured system availability |
WO2004004217A1 (en) * | 2002-06-28 | 2004-01-08 | Viewgate Networks Limited | Virtual private network validator |
US20040006708A1 (en) * | 2002-07-02 | 2004-01-08 | Lucent Technologies Inc. | Method and apparatus for enabling peer-to-peer virtual private network (P2P-VPN) services in VPN-enabled network |
US6701437B1 (en) * | 1998-04-17 | 2004-03-02 | Vpnet Technologies, Inc. | Method and apparatus for processing communications in a virtual private network |
US6701358B1 (en) | 1999-04-02 | 2004-03-02 | Nortel Networks Limited | Bulk configuring a virtual private network |
US20040044753A1 (en) * | 2002-02-27 | 2004-03-04 | Lucida, Inc. | Method and system for dynamic business management of a network |
US20040044891A1 (en) * | 2002-09-04 | 2004-03-04 | Secure Computing Corporation | System and method for secure group communications |
US6704873B1 (en) * | 1999-07-30 | 2004-03-09 | Accenture Llp | Secure gateway interconnection in an e-commerce based environment |
US20040054902A1 (en) * | 2000-12-06 | 2004-03-18 | Yoshinori Fujimoto | Virtual private network |
US20040054769A1 (en) * | 2002-07-31 | 2004-03-18 | Alcatel | System for managing networks using rules and including an inference engine |
US20040078683A1 (en) * | 2000-05-05 | 2004-04-22 | Buia Christhoper A. | Systems and methods for managing and analyzing faults in computer networks |
US20040083382A1 (en) * | 2002-10-28 | 2004-04-29 | Secure Computing Corporation | Associative policy model |
US20040088542A1 (en) * | 2002-11-06 | 2004-05-06 | Olivier Daude | Virtual private network crossovers based on certificates |
US20040093492A1 (en) * | 2002-11-13 | 2004-05-13 | Olivier Daude | Virtual private network management with certificates |
US20040093431A1 (en) * | 1999-08-26 | 2004-05-13 | Genty Denise Marie | Method and system for algorithm-based address-evading network snoop avoider |
US20040098485A1 (en) * | 1998-10-30 | 2004-05-20 | Science Applications International Corporation | Agile network protocol for secure communications using secure domain names |
WO2004047363A1 (en) * | 2002-11-17 | 2004-06-03 | Huawei Technologies Co., Ltd. | A method for realizing the reconstruction of optical network |
US20040107285A1 (en) * | 1998-10-30 | 2004-06-03 | Science Applications International Corporation | Method for establishing secure communication link between computers of virtual private network |
US20040120260A1 (en) * | 2002-12-18 | 2004-06-24 | Mark Bernier | Methods and apparatus for providing security to a computerized device |
US6765591B2 (en) * | 1999-04-02 | 2004-07-20 | Nortel Networks Limited | Managing a virtual private network |
US20040158601A1 (en) * | 2003-02-06 | 2004-08-12 | Julie Wing | Method for deploying a virtual private network |
US6778498B2 (en) | 2001-03-20 | 2004-08-17 | Mci, Inc. | Virtual private network (VPN)-aware customer premises equipment (CPE) edge router |
EP1460860A1 (en) * | 2003-03-19 | 2004-09-22 | Siemens Aktiengesellschaft | Method, system and apparatus for managing bearer connections in a telecommunications network |
EP1460859A1 (en) * | 2003-03-19 | 2004-09-22 | Siemens Aktiengesellschaft | Method, system and apparatus for managing signaling connections in a telecommunications network |
US20040213260A1 (en) * | 2003-04-28 | 2004-10-28 | Cisco Technology, Inc. | Methods and apparatus for securing proxy Mobile IP |
US20040218611A1 (en) * | 2003-01-21 | 2004-11-04 | Samsung Electronics Co., Ltd. | Gateway for supporting communications between network devices of different private networks |
US6823462B1 (en) | 2000-09-07 | 2004-11-23 | International Business Machines Corporation | Virtual private network with multiple tunnels associated with one group name |
US20040240397A1 (en) * | 2003-03-19 | 2004-12-02 | Siemens Aktiengesellschaft | Method, system and apparatus for managing connections in a telecommunications network |
US20040246890A1 (en) * | 1996-08-22 | 2004-12-09 | Marchok Daniel J. | OFDM/DMT/ digital communications system including partial sequence symbol processing |
US20050022183A1 (en) * | 1999-04-02 | 2005-01-27 | Poisson Matthew W. | Virtual private network manager GUI with links for use in configuring a virtual private network |
US20050055463A1 (en) * | 2003-05-16 | 2005-03-10 | Verilegal, Inc. | Secure internet functionality |
US20050066053A1 (en) * | 2001-03-20 | 2005-03-24 | Worldcom, Inc. | System, method and apparatus that isolate virtual private network (VPN) and best effort traffic to resist denial of service attacks |
US6883100B1 (en) * | 1999-05-10 | 2005-04-19 | Sun Microsystems, Inc. | Method and system for dynamic issuance of group certificates |
KR100485769B1 (en) * | 2002-05-14 | 2005-04-28 | 삼성전자주식회사 | Apparatus and method for offering connection between network devices located in different home networks |
KR100485801B1 (en) * | 2002-03-07 | 2005-04-28 | 삼성전자주식회사 | Network connecting apparatus and method for offering direct connection between network devices existing different private networks |
US6894999B1 (en) * | 2000-11-17 | 2005-05-17 | Advanced Micro Devices, Inc. | Combining VLAN tagging with other network protocols allows a user to transfer data on a network with enhanced security |
US20050152393A1 (en) * | 2004-01-13 | 2005-07-14 | Wen-Chih Lin | Method of establishing connection between wireless communication devices |
US6931529B2 (en) | 2001-01-05 | 2005-08-16 | International Business Machines Corporation | Establishing consistent, end-to-end protection for a user datagram |
US6938169B1 (en) | 1999-12-10 | 2005-08-30 | Sun Microsystems, Inc. | Channel-specific file system views in a private network using a public-network infrastructure |
US20050195962A1 (en) * | 2004-03-08 | 2005-09-08 | Brown Wendell D. | Virtual call center |
US20050246519A1 (en) * | 2004-03-31 | 2005-11-03 | Novell, Inc. | Secure transparent virtual private networks |
US6963925B1 (en) * | 1999-06-24 | 2005-11-08 | Matsushita Electric Industrial Co., Ltd. | Gateway apparatus and the method thereof |
US6970941B1 (en) | 1999-12-10 | 2005-11-29 | Sun Microsystems, Inc. | System and method for separating addresses from the delivery scheme in a virtual private network |
US6976071B1 (en) * | 2000-05-03 | 2005-12-13 | Nortel Networks Limited | Detecting if a secure link is alive |
US6977929B1 (en) | 1999-12-10 | 2005-12-20 | Sun Microsystems, Inc. | Method and system for facilitating relocation of devices on a network |
US6981155B1 (en) | 1999-07-14 | 2005-12-27 | Symantec Corporation | System and method for computer security |
US6986061B1 (en) | 2000-11-20 | 2006-01-10 | International Business Machines Corporation | Integrated system for network layer security and fine-grained identity-based access control |
US20060015450A1 (en) * | 2004-07-13 | 2006-01-19 | Wells Fargo Bank, N.A. | Financial services network and associated processes |
US20060040664A1 (en) * | 2004-07-13 | 2006-02-23 | Murray Richard J | Communications systems |
US7010702B1 (en) | 1997-06-12 | 2006-03-07 | Vpnet Technologies, Inc. | Architecture for virtual private networks |
US7020696B1 (en) * | 2000-05-20 | 2006-03-28 | Ciena Corp. | Distributed user management information in telecommunications networks |
US7036143B1 (en) * | 2001-09-19 | 2006-04-25 | Cisco Technology, Inc. | Methods and apparatus for virtual private network based mobility |
US20060090074A1 (en) * | 2004-10-22 | 2006-04-27 | Kazumine Matoba | Encryption communication system |
US7039687B1 (en) * | 1998-08-07 | 2006-05-02 | Nortel Networks Limited | Multi-protocol label switching virtual private networks |
US7058798B1 (en) | 2000-04-11 | 2006-06-06 | Sun Microsystems, Inc. | Method ans system for pro-active credential refreshing |
US7069592B2 (en) | 2000-04-26 | 2006-06-27 | Ford Global Technologies, Llc | Web-based document system |
US7072964B1 (en) * | 1999-08-31 | 2006-07-04 | Science Applications International Corporation | System and method for interconnecting multiple virtual private networks |
US7072407B2 (en) | 2000-01-31 | 2006-07-04 | Brookline Flolmstead Llc | Combination power and full duplex data cable |
US7100195B1 (en) | 1999-07-30 | 2006-08-29 | Accenture Llp | Managing user information on an e-commerce system |
US20060212937A1 (en) * | 2005-02-18 | 2006-09-21 | Microsoft Corporation | SyncML based OMA connectivity object to provision VPN connections |
US20060236095A1 (en) * | 2005-02-14 | 2006-10-19 | Smith Robert D | Systems and methods for automatically configuring and managing network devices and virtual private networks |
US7127506B1 (en) * | 1999-05-28 | 2006-10-24 | Teradyne, Inc. | PC configuration fault analysis |
US7130629B1 (en) | 2000-03-08 | 2006-10-31 | Cisco Technology, Inc. | Enabling services for multiple sessions using a single mobile node |
GB2426141A (en) * | 2005-05-12 | 2006-11-15 | 3Com Corporaton | Configuration of Virtual Private Networks (VPNs) |
US20070016947A1 (en) * | 2002-04-04 | 2007-01-18 | Joel Balissat | Method and system for securely scanning network traffic |
US20070058654A1 (en) * | 2003-07-10 | 2007-03-15 | Johann Arnold | Arrangement and coupling device for securing data access |
US20070061883A1 (en) * | 1999-07-14 | 2007-03-15 | Symantec Corporation | System and method for generating fictitious content for a computer |
US7213262B1 (en) | 1999-05-10 | 2007-05-01 | Sun Microsystems, Inc. | Method and system for proving membership in a nested group using chains of credentials |
US20070136805A1 (en) * | 2005-11-23 | 2007-06-14 | Ils Technology Llc | Business-to-business remote network connectivity |
US20070150932A1 (en) * | 2005-12-28 | 2007-06-28 | Thomas Milligan | Systems and methods for providing secure access to embedded devices using a trust manager and a security broker |
US7240202B1 (en) * | 2000-03-16 | 2007-07-03 | Novell, Inc. | Security context sharing |
US20070157315A1 (en) * | 1999-08-30 | 2007-07-05 | Symantec Corporation | System and method for using timestamps to detect attacks |
US7251728B2 (en) | 2000-07-07 | 2007-07-31 | Message Secure Corporation | Secure and reliable document delivery using routing lists |
US20070180514A1 (en) * | 2002-04-04 | 2007-08-02 | Joel Balissat | Multipoint server for providing secure, scaleable connections between a plurality of network devices |
US20070199066A1 (en) * | 2005-02-14 | 2007-08-23 | Smith Robert D | Systems and methods for automatically configuring network devices |
US7269639B1 (en) * | 2000-12-13 | 2007-09-11 | Cisco Technology, Inc. | Method and system to provide secure in-band management for a packet data network |
US20070211650A1 (en) * | 1998-10-23 | 2007-09-13 | Brocade Communications Systems, Inc. | Node device cooperating with switch which implements zones in a fibre channel system |
US20070214232A1 (en) * | 2006-03-07 | 2007-09-13 | Nokia Corporation | System for Uniform Addressing of Home Resources Regardless of Remote Clients Network Location |
US20070226325A1 (en) * | 2006-03-23 | 2007-09-27 | Alcatel | Virtual private network service status management |
US20070234418A1 (en) * | 2006-03-30 | 2007-10-04 | Samsung Electronics Co., Ltd. | Method and apparatus of remote access message differentiation in VPN endpoint routers |
US20070271606A1 (en) * | 2006-05-17 | 2007-11-22 | Amann Keith R | Apparatus and method for establishing a VPN tunnel between a wireless device and a LAN |
US7308713B1 (en) * | 2000-11-22 | 2007-12-11 | Intel Corporation | Link-lock device and method of monitoring and controlling a link for failures and intrusions |
US20070299954A1 (en) * | 2006-06-27 | 2007-12-27 | International Business Machines Corporation | System, method and program for determining a network path by which to send a message |
US20070299940A1 (en) * | 2006-06-23 | 2007-12-27 | Microsoft Corporation | Public network distribution of software updates |
EP1885082A1 (en) * | 2006-08-02 | 2008-02-06 | O2 Micro, Inc. | Policy based VPN configuration for firewall/VPN security gateway applicance |
US20080043764A1 (en) * | 2001-04-24 | 2008-02-21 | Hitachi, Ltd. | Integrated service management system |
US7336790B1 (en) | 1999-12-10 | 2008-02-26 | Sun Microsystems Inc. | Decoupling access control from key management in a network |
US20080066145A1 (en) * | 2006-09-08 | 2008-03-13 | Ibahn General Holdings, Inc. | Monitoring and reporting policy compliance of home networks |
US20080072291A1 (en) * | 2002-06-13 | 2008-03-20 | Carley Jeffrey A | Secure management access control for computers, embedded and card embodiment |
US20080080517A1 (en) * | 2006-09-28 | 2008-04-03 | At & T Corp. | System and method for forwarding traffic data in an MPLS VPN |
US20080091763A1 (en) * | 2006-10-13 | 2008-04-17 | Quipa Holdings Limited | method for sharing functionality and/or data between two or more linked entities |
US7362742B1 (en) | 2003-01-28 | 2008-04-22 | Cisco Technology, Inc. | Methods and apparatus for synchronizing subnet mapping tables |
US20080170588A1 (en) * | 2007-01-16 | 2008-07-17 | Thierry Tapie | Device for generating a sampled ramp signal representative of a synchronization signal, and device for assisting the reconstruction of a synchronization signal, for a packet switching network |
US20080222282A1 (en) * | 2007-03-05 | 2008-09-11 | Cisco Technology, Inc. | Analyzing virtual private network failures |
US7447188B1 (en) | 2004-06-22 | 2008-11-04 | Cisco Technology, Inc. | Methods and apparatus for supporting mobile IP proxy registration in a system implementing mulitple VLANs |
US7457289B2 (en) | 2002-12-16 | 2008-11-25 | Cisco Technology, Inc. | Inter-proxy communication protocol for mobile IP |
US20080298483A1 (en) * | 1996-08-22 | 2008-12-04 | Tellabs Operations, Inc. | Apparatus and method for symbol alignment in a multi-point OFDM/DMT digital communications system |
US7471661B1 (en) | 2002-02-20 | 2008-12-30 | Cisco Technology, Inc. | Methods and apparatus for supporting proxy mobile IP registration in a wireless local area network |
US20090003421A1 (en) * | 1998-05-29 | 2009-01-01 | Tellabs Operations, Inc. | Time-domain equalization for discrete multi-tone systems |
US20090024387A1 (en) * | 2000-03-28 | 2009-01-22 | Tellabs Operations, Inc. | Communication system noise cancellation power signal calculation techniques |
US20090022216A1 (en) * | 1998-04-03 | 2009-01-22 | Tellabs Operations, Inc. | Spectrally constrained impulse shortening filter for a discrete multi-tone receiver |
US7567511B1 (en) | 2006-05-10 | 2009-07-28 | At&T Intellectual Property Ii, L.P. | Method and apparatus for computing the cost of providing VPN service |
US20090319599A1 (en) * | 2008-06-18 | 2009-12-24 | Caunter Mark Leslie | Remote selection and authorization of collected media transmission |
US20100002668A1 (en) * | 2003-01-14 | 2010-01-07 | Panasonic Corporation | Service in wlan inter-working, address management system, and method |
US20100034207A1 (en) * | 2008-08-05 | 2010-02-11 | Mcgrew David | ENFORCING THE PRINCIPLE OF LEAST PRIVILEGE FOR LARGE TUNNEL-LESS VPNs |
US7689722B1 (en) * | 2002-10-07 | 2010-03-30 | Cisco Technology, Inc. | Methods and apparatus for virtual private network fault tolerance |
US20100104035A1 (en) * | 1996-08-22 | 2010-04-29 | Marchok Daniel J | Apparatus and method for clock synchronization in a multi-point OFDM/DMT digital communications system |
US20100111093A1 (en) * | 2008-10-31 | 2010-05-06 | Michael Satterlee | Methods and apparatus to dynamically control connectivity within virtual private networks |
US20100115604A1 (en) * | 2008-10-31 | 2010-05-06 | Alexandre Gerber | Methods and apparatus to dynamically control access from virtual private networks to network-based shared resources |
US20100150153A1 (en) * | 2008-12-17 | 2010-06-17 | At&T Intellectual Property I, L.P. | End user circuit diversity auditing methods |
US7765581B1 (en) * | 1999-12-10 | 2010-07-27 | Oracle America, Inc. | System and method for enabling scalable security in a virtual private network |
US7895332B2 (en) | 2006-10-30 | 2011-02-22 | Quest Software, Inc. | Identity migration system apparatus and method |
US7904949B2 (en) | 2005-12-19 | 2011-03-08 | Quest Software, Inc. | Apparatus, systems and methods to provide authentication services to a legacy application |
KR101022157B1 (en) | 2003-12-16 | 2011-03-17 | 주식회사 케이티 | Method for processing service in secure socket layer virtual private network |
US7953070B1 (en) | 2006-08-17 | 2011-05-31 | Avaya Inc. | Client configuration download for VPN voice gateways |
US7961722B1 (en) * | 2006-03-07 | 2011-06-14 | Juniper Networks, Inc. | Multiple virtualized operating environments within a VPN appliance |
US20110142053A1 (en) * | 2009-12-15 | 2011-06-16 | Jacobus Van Der Merwe | Methods and apparatus to communicatively couple virtual private networks to virtual machines within distributive computing networks |
US8045565B1 (en) | 2001-11-20 | 2011-10-25 | Brookline Flolmstead Llc | Method and apparatus for an environmentally hardened ethernet network system |
US20110270949A1 (en) * | 2008-04-08 | 2011-11-03 | Geist Joshua B | System and method for providing data and application continuity in a computer system |
US8087075B2 (en) | 2006-02-13 | 2011-12-27 | Quest Software, Inc. | Disconnected credential validation using pre-fetched service tickets |
US8086710B2 (en) | 2006-10-30 | 2011-12-27 | Quest Software, Inc. | Identity migration apparatus and method |
USRE43163E1 (en) | 1999-05-14 | 2012-02-07 | Brookline Flolmstead Llc | High-speed network of independently linked nodes |
US20120110655A1 (en) * | 2010-10-29 | 2012-05-03 | Hon Hai Precision Industry Co., Ltd. | Data transmission management server and method |
US8224971B1 (en) * | 2009-12-28 | 2012-07-17 | Amazon Technologies, Inc. | Using virtual networking devices and routing information to initiate external actions |
US8239531B1 (en) * | 2001-07-23 | 2012-08-07 | At&T Intellectual Property Ii, L.P. | Method and apparatus for connection to virtual private networks for secure transactions |
US8245242B2 (en) | 2004-07-09 | 2012-08-14 | Quest Software, Inc. | Systems and methods for managing policies on a computer |
US8255984B1 (en) | 2009-07-01 | 2012-08-28 | Quest Software, Inc. | Single sign-on system for shared resource environments |
US8312129B1 (en) | 2009-12-28 | 2012-11-13 | Amazon Technologies, Inc. | Using virtual networking devices to connect managed computer networks |
US8370488B1 (en) | 2009-12-28 | 2013-02-05 | Amazon Technologies, Inc. | Using virtual networking devices to manage routing communications between connected computer networks |
US8375421B1 (en) * | 2006-03-02 | 2013-02-12 | F5 Networks, Inc. | Enabling a virtual meeting room through a firewall on a network |
US8392608B1 (en) | 2009-12-07 | 2013-03-05 | Amazon Technologies, Inc. | Using virtual networking devices to manage network configuration |
US8429712B2 (en) | 2006-06-08 | 2013-04-23 | Quest Software, Inc. | Centralized user authentication system apparatus and method |
US8473557B2 (en) | 2010-08-24 | 2013-06-25 | At&T Intellectual Property I, L.P. | Methods and apparatus to migrate virtual machines between distributive computing networks across a wide area network |
US8555389B2 (en) | 2005-01-10 | 2013-10-08 | Mcafee, Inc. | Integrated firewall, IPS, and virus scanner system and method |
US8600830B2 (en) | 2003-02-05 | 2013-12-03 | Steven M. Hoffberg | System and method for providing a payment to a non-winning auction participant |
US20140289410A1 (en) * | 1999-02-24 | 2014-09-25 | Guest Tek Interactive Entertainment Ltd. | Methods and apparatus for providing high speed connectivity to a hotel environment |
US8904181B1 (en) | 2001-03-23 | 2014-12-02 | David P. Felsher | System and method for secure three-party communications |
US8995301B1 (en) | 2009-12-07 | 2015-03-31 | Amazon Technologies, Inc. | Using virtual networking devices to manage routing cost information |
US9014250B2 (en) | 1998-04-03 | 2015-04-21 | Tellabs Operations, Inc. | Filter for impulse response shortening with additional spectral constraints for multicarrier transmission |
US9036504B1 (en) | 2009-12-07 | 2015-05-19 | Amazon Technologies, Inc. | Using virtual networking devices and routing information to associate network addresses with computing nodes |
US20150271140A1 (en) * | 1999-06-15 | 2015-09-24 | Tectia Oyj | Tunnelling of Information |
US9203747B1 (en) | 2009-12-07 | 2015-12-01 | Amazon Technologies, Inc. | Providing virtual networking device functionality for managed computer networks |
US20160044000A1 (en) * | 2014-08-05 | 2016-02-11 | Fireeye, Inc. | System and method to communicate sensitive information via one or more untrusted intermediate nodes with resilience to disconnected network topology |
US20160173528A1 (en) * | 2014-12-15 | 2016-06-16 | Guide Wang | Safe input browser, operation method thereof, and computer system having the safe input browser |
US9386035B2 (en) | 2011-06-21 | 2016-07-05 | At&T Intellectual Property I, L.P. | Methods and apparatus to configure virtual private mobile networks for security |
US9397922B1 (en) * | 2013-02-28 | 2016-07-19 | EarthLink, LLC | Automated network testing platform |
US9413724B2 (en) | 2013-02-05 | 2016-08-09 | Fortinet, Inc. | Cloud-based security policy configuration |
US9432258B2 (en) | 2011-06-06 | 2016-08-30 | At&T Intellectual Property I, L.P. | Methods and apparatus to configure virtual private mobile networks to reduce latency |
US20170063800A1 (en) * | 2012-10-10 | 2017-03-02 | International Business Machines Corporation | Dynamic virtual private network |
US20170064749A1 (en) * | 2015-08-28 | 2017-03-02 | Nicira, Inc. | Associating Service Tags with Remote Data Message Flows Based on Remote Device Management Attributes |
US20170180321A1 (en) * | 2015-12-18 | 2017-06-22 | Nicira, Inc. | Datapath processing of service rules with qualifiers defined in terms of dynamic groups |
US20170180319A1 (en) * | 2015-12-18 | 2017-06-22 | Nicira, Inc. | Datapath processing of service rules with qualifiers defined in terms of template identifiers and/or template matching criteria |
US9794797B2 (en) | 2005-10-04 | 2017-10-17 | Steven M. Hoffberg | Multifactorial optimization system and method |
US9954686B2 (en) | 2001-01-18 | 2018-04-24 | Virnetx, Inc. | Systems and methods for certifying devices to communicate securely |
US10044678B2 (en) | 2011-08-31 | 2018-08-07 | At&T Intellectual Property I, L.P. | Methods and apparatus to configure virtual private mobile networks with virtual private networks |
US10148696B2 (en) | 2015-12-18 | 2018-12-04 | Nicira, Inc. | Service rule console for creating, viewing and updating template based service rules |
US10361802B1 (en) | 1999-02-01 | 2019-07-23 | Blanding Hovenweep, Llc | Adaptive pattern recognition based control system and method |
US10387270B2 (en) | 2005-04-21 | 2019-08-20 | Justservice.Net Llc | Data backup, storage, transfer and retrieval system, method and computer program product |
US10469450B2 (en) | 2015-12-18 | 2019-11-05 | Nicira, Inc. | Creating and distributing template based service rules |
US10476868B2 (en) | 2005-04-21 | 2019-11-12 | Justservice.Net Llc | Data backup and transfer system, method and computer program product |
US10511573B2 (en) | 1998-10-30 | 2019-12-17 | Virnetx, Inc. | Agile network protocol for secure communications using secure domain names |
US10904217B2 (en) | 2018-05-31 | 2021-01-26 | Cisco Technology, Inc. | Encryption for gateway tunnel-based VPNs independent of wan transport addresses |
US20220070023A1 (en) * | 2020-09-01 | 2022-03-03 | Ricoh Company, Ltd. | Communication system, vpn termination device, and storage medium |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5339356A (en) * | 1991-03-20 | 1994-08-16 | Fujitsu Limited | Virtual private network connecting system |
US5432783A (en) * | 1992-10-21 | 1995-07-11 | Bell Communications Research, Inc. | System and method for providing egress policing for broadband virtual private networks |
US5490212A (en) * | 1993-08-30 | 1996-02-06 | Alcatel Sel Aktiengesellschaft | Call-routing method for a virtual private network as well as service computer and exchange therefor |
US5504921A (en) * | 1990-09-17 | 1996-04-02 | Cabletron Systems, Inc. | Network management system using model-based intelligence |
US5550816A (en) * | 1994-12-29 | 1996-08-27 | Storage Technology Corporation | Method and apparatus for virtual switching |
US5623601A (en) * | 1994-11-18 | 1997-04-22 | Milkway Networks Corporation | Apparatus and method for providing a secure gateway for communication and data exchanges between networks |
US5659542A (en) * | 1995-03-03 | 1997-08-19 | Intecom, Inc. | System and method for signalling and call processing for private and hybrid communications systems including multimedia systems |
US5742762A (en) * | 1995-05-19 | 1998-04-21 | Telogy Networks, Inc. | Network management gateway |
US5768271A (en) * | 1996-04-12 | 1998-06-16 | Alcatel Data Networks Inc. | Virtual private network |
US5799016A (en) * | 1996-01-11 | 1998-08-25 | U S West, Inc. | Network addressing scheme encoding communication channel information |
US5898830A (en) * | 1996-10-17 | 1999-04-27 | Network Engineering Software | Firewall providing enhanced network security and user transparency |
-
1998
- 1998-01-27 US US09/013,743 patent/US6079020A/en not_active Expired - Lifetime
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5504921A (en) * | 1990-09-17 | 1996-04-02 | Cabletron Systems, Inc. | Network management system using model-based intelligence |
US5339356A (en) * | 1991-03-20 | 1994-08-16 | Fujitsu Limited | Virtual private network connecting system |
US5432783A (en) * | 1992-10-21 | 1995-07-11 | Bell Communications Research, Inc. | System and method for providing egress policing for broadband virtual private networks |
US5490212A (en) * | 1993-08-30 | 1996-02-06 | Alcatel Sel Aktiengesellschaft | Call-routing method for a virtual private network as well as service computer and exchange therefor |
US5623601A (en) * | 1994-11-18 | 1997-04-22 | Milkway Networks Corporation | Apparatus and method for providing a secure gateway for communication and data exchanges between networks |
US5550816A (en) * | 1994-12-29 | 1996-08-27 | Storage Technology Corporation | Method and apparatus for virtual switching |
US5659542A (en) * | 1995-03-03 | 1997-08-19 | Intecom, Inc. | System and method for signalling and call processing for private and hybrid communications systems including multimedia systems |
US5742762A (en) * | 1995-05-19 | 1998-04-21 | Telogy Networks, Inc. | Network management gateway |
US5799016A (en) * | 1996-01-11 | 1998-08-25 | U S West, Inc. | Network addressing scheme encoding communication channel information |
US5768271A (en) * | 1996-04-12 | 1998-06-16 | Alcatel Data Networks Inc. | Virtual private network |
US5898830A (en) * | 1996-10-17 | 1999-04-27 | Network Engineering Software | Firewall providing enhanced network security and user transparency |
Cited By (517)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100104035A1 (en) * | 1996-08-22 | 2010-04-29 | Marchok Daniel J | Apparatus and method for clock synchronization in a multi-point OFDM/DMT digital communications system |
US8665859B2 (en) | 1996-08-22 | 2014-03-04 | Tellabs Operations, Inc. | Apparatus and method for clock synchronization in a multi-point OFDM/DMT digital communications system |
US20040246890A1 (en) * | 1996-08-22 | 2004-12-09 | Marchok Daniel J. | OFDM/DMT/ digital communications system including partial sequence symbol processing |
US20080298483A1 (en) * | 1996-08-22 | 2008-12-04 | Tellabs Operations, Inc. | Apparatus and method for symbol alignment in a multi-point OFDM/DMT digital communications system |
US8139471B2 (en) | 1996-08-22 | 2012-03-20 | Tellabs Operations, Inc. | Apparatus and method for clock synchronization in a multi-point OFDM/DMT digital communications system |
US8547823B2 (en) | 1996-08-22 | 2013-10-01 | Tellabs Operations, Inc. | OFDM/DMT/ digital communications system including partial sequence symbol processing |
US6438127B1 (en) * | 1997-03-12 | 2002-08-20 | Mannesmann Ag | Process and apparatus for the operation of virtual private networks on a common data packet communication network |
US20060129792A1 (en) * | 1997-06-12 | 2006-06-15 | Bots Henk J | Architecture for virtual private networks |
US7617527B2 (en) | 1997-06-12 | 2009-11-10 | Avaya Inc. | Architecture for virtual private networks |
US7010702B1 (en) | 1997-06-12 | 2006-03-07 | Vpnet Technologies, Inc. | Architecture for virtual private networks |
US6247052B1 (en) * | 1997-12-23 | 2001-06-12 | Alcatel Usa Sourcing, L.P. | Graphic user interface system for a telecommunications switch management system |
US9014250B2 (en) | 1998-04-03 | 2015-04-21 | Tellabs Operations, Inc. | Filter for impulse response shortening with additional spectral constraints for multicarrier transmission |
US20090022216A1 (en) * | 1998-04-03 | 2009-01-22 | Tellabs Operations, Inc. | Spectrally constrained impulse shortening filter for a discrete multi-tone receiver |
US8102928B2 (en) | 1998-04-03 | 2012-01-24 | Tellabs Operations, Inc. | Spectrally constrained impulse shortening filter for a discrete multi-tone receiver |
US6701437B1 (en) * | 1998-04-17 | 2004-03-02 | Vpnet Technologies, Inc. | Method and apparatus for processing communications in a virtual private network |
US20040210662A1 (en) * | 1998-04-29 | 2004-10-21 | Alcatel Canada Inc. | Internet-enabled service management and authorization system and method |
US6434619B1 (en) * | 1998-04-29 | 2002-08-13 | Alcatel Canada Inc. | Internet-enabled service management system and method |
US7366786B2 (en) * | 1998-04-29 | 2008-04-29 | Alcatel-Lucent | Internet-enabled service management and authorization system and method |
US6732181B2 (en) * | 1998-04-29 | 2004-05-04 | Alcatel Canada Inc. | Internet-enabled service management and authorization system and method |
US7916801B2 (en) | 1998-05-29 | 2011-03-29 | Tellabs Operations, Inc. | Time-domain equalization for discrete multi-tone systems |
US8315299B2 (en) | 1998-05-29 | 2012-11-20 | Tellabs Operations, Inc. | Time-domain equalization for discrete multi-tone systems |
US20090003421A1 (en) * | 1998-05-29 | 2009-01-01 | Tellabs Operations, Inc. | Time-domain equalization for discrete multi-tone systems |
US8050288B2 (en) | 1998-06-30 | 2011-11-01 | Tellabs Operations, Inc. | Method and apparatus for interference suppression in orthogonal frequency division multiplexed (OFDM) wireless communication systems |
US20020105928A1 (en) * | 1998-06-30 | 2002-08-08 | Samir Kapoor | Method and apparatus for interference suppression in orthogonal frequency division multiplexed (OFDM) wireless communication systems |
US8934457B2 (en) | 1998-06-30 | 2015-01-13 | Tellabs Operations, Inc. | Method and apparatus for interference suppression in orthogonal frequency division multiplexed (OFDM) wireless communication systems |
US7039687B1 (en) * | 1998-08-07 | 2006-05-02 | Nortel Networks Limited | Multi-protocol label switching virtual private networks |
US8279775B2 (en) * | 1998-10-23 | 2012-10-02 | Brocade Communications Systems, Inc. | Node device cooperating with switch which implements zones in a fibre channel system |
US20070211650A1 (en) * | 1998-10-23 | 2007-09-13 | Brocade Communications Systems, Inc. | Node device cooperating with switch which implements zones in a fibre channel system |
US8730840B2 (en) | 1998-10-23 | 2014-05-20 | Polycom, Inc. | Node device cooperating with switch which implements zones in a fibre channel system |
US20060123134A1 (en) * | 1998-10-30 | 2006-06-08 | Science Applications International Corporation | Agile network protocol for secure communications with assured system availability |
US20110185169A1 (en) * | 1998-10-30 | 2011-07-28 | Edmund Colby Munger | Agile Network Protocol For Secure Communications With Assured System Availability. |
US6502135B1 (en) * | 1998-10-30 | 2002-12-31 | Science Applications International Corporation | Agile network protocol for secure communications with assured system availability |
US9413766B2 (en) | 1998-10-30 | 2016-08-09 | Virnetx, Inc. | Method for establishing connection between devices |
US9386000B2 (en) | 1998-10-30 | 2016-07-05 | Virnetx, Inc. | System and method for establishing a communication link |
US9374346B2 (en) | 1998-10-30 | 2016-06-21 | Virnetx, Inc. | Agile network protocol for secure communications using secure domain names |
US20080005792A1 (en) * | 1998-10-30 | 2008-01-03 | Science Applications International Corporation | Method for establishing secure communication link between computers of virtual private network |
US20030037142A1 (en) * | 1998-10-30 | 2003-02-20 | Science Applications International Corporation | Agile network protocol for secure communications with assured system availability |
US20080034201A1 (en) * | 1998-10-30 | 2008-02-07 | Virnetx, Inc. | agile network protocol for secure communications with assured system availability |
US20080040791A1 (en) * | 1998-10-30 | 2008-02-14 | Virnetx, Inc. | Agile network protocol for secure communications with assured system availability |
US20080040792A1 (en) * | 1998-10-30 | 2008-02-14 | Virnetx, Inc. | Agile network protocol for secure communications using secure domain names |
US20080040783A1 (en) * | 1998-10-30 | 2008-02-14 | Virnetx, Inc. | Agile network protocol for secure communications using secure domain names |
US7418504B2 (en) | 1998-10-30 | 2008-08-26 | Virnetx, Inc. | Agile network protocol for secure communications using secure domain names |
US9100375B2 (en) | 1998-10-30 | 2015-08-04 | Virnetx, Inc. | System and method employing an agile network protocol for secure communications using secure domain names |
US9094399B2 (en) | 1998-10-30 | 2015-07-28 | Virnetx, Inc. | Method for establishing secure communication link between computers of virtual private network |
US9077694B2 (en) | 1998-10-30 | 2015-07-07 | Virnetx, Inc. | Agile network protocol for secure communications using secure domain names |
US20080222415A1 (en) * | 1998-10-30 | 2008-09-11 | Virnetx, Inc. | Agile network protocol for secure communications with assured system availability |
US7188180B2 (en) | 1998-10-30 | 2007-03-06 | Vimetx, Inc. | Method for establishing secure communication link between computers of virtual private network |
US9077695B2 (en) | 1998-10-30 | 2015-07-07 | Virnetx, Inc. | System and method for establishing an encrypted communication link based on IP address lookup requests |
US9037713B2 (en) | 1998-10-30 | 2015-05-19 | Virnetx, Inc. | Agile network protocol for secure communications using secure domain names |
US9038163B2 (en) | 1998-10-30 | 2015-05-19 | Virnetx, Inc. | Systems and methods for connecting network devices over communication network |
US9027115B2 (en) | 1998-10-30 | 2015-05-05 | Virnetx, Inc. | System and method for using a registered name to connect network devices with a link that uses encryption |
US7490151B2 (en) * | 1998-10-30 | 2009-02-10 | Virnetx Inc. | Establishment of a secure communication link based on a domain name service (DNS) request |
US7133930B2 (en) | 1998-10-30 | 2006-11-07 | Science Applications International Corporation | Agile network protocol for secure communications with assured system availability |
US6618761B2 (en) | 1998-10-30 | 2003-09-09 | Science Applications International Corp. | Agile network protocol for secure communications with assured system availability |
US7010604B1 (en) | 1998-10-30 | 2006-03-07 | Science Applications International Corporation | Agile network protocol for secure communications with assured system availability |
US8943201B2 (en) | 1998-10-30 | 2015-01-27 | Virnetx, Inc. | Method for establishing encrypted channel |
US10511573B2 (en) | 1998-10-30 | 2019-12-17 | Virnetx, Inc. | Agile network protocol for secure communications using secure domain names |
US7921211B2 (en) | 1998-10-30 | 2011-04-05 | Virnetx, Inc. | Agile network protocol for secure communications using secure domain names |
US8904516B2 (en) | 1998-10-30 | 2014-12-02 | Virnetx, Inc. | System and method employing an agile network protocol for secure communications using secure domain names |
US8874771B2 (en) | 1998-10-30 | 2014-10-28 | Virnetx, Inc. | Agile network protocol for secure communications with assured system availability |
US8868705B2 (en) | 1998-10-30 | 2014-10-21 | Virnetx, Inc. | Agile network protocol for secure communications using secure domain names |
US7933990B2 (en) | 1998-10-30 | 2011-04-26 | Virnetx, Inc. | Agile network protocol for secure communications with assured system availability |
US8850009B2 (en) | 1998-10-30 | 2014-09-30 | Virnetx, Inc. | System and method employing an agile network protocol for secure communications using secure domain names |
US7945654B2 (en) | 1998-10-30 | 2011-05-17 | Virnetx, Inc. | Agile network protocol for secure communications using secure domain names |
US6907473B2 (en) | 1998-10-30 | 2005-06-14 | Science Applications International Corp. | Agile network protocol for secure communications with assured system availability |
US8843643B2 (en) | 1998-10-30 | 2014-09-23 | Virnetx, Inc. | System and method employing an agile network protocol for secure communications using secure domain names |
US20110167087A1 (en) * | 1998-10-30 | 2011-07-07 | VirtnetX, Inc. | agile network protocol for secure communications using secure domain names |
US7987274B2 (en) | 1998-10-30 | 2011-07-26 | Virnetx, Incorporated | Method for establishing secure communication link between computers of virtual private network |
US9479426B2 (en) | 1998-10-30 | 2016-10-25 | Virnetz, Inc. | Agile network protocol for secure communications with assured system availability |
US9819649B2 (en) | 1998-10-30 | 2017-11-14 | Virnetx, Inc. | System and method employing an agile network protocol for secure communications using secure domain names |
US20040003116A1 (en) * | 1998-10-30 | 2004-01-01 | Science Applications International Corporation | Agile network protocol for secure communications with assured system availability |
US20110191582A1 (en) * | 1998-10-30 | 2011-08-04 | Edmund Colby Munger | Agile Network Protocol For Secure Communications With Assured System Availability |
US8572247B2 (en) | 1998-10-30 | 2013-10-29 | Virnetx, Inc. | Agile network protocol for secure communications using secure domain names |
US7996539B2 (en) | 1998-10-30 | 2011-08-09 | Virnetx, Inc. | Agile network protocol for secure communications with assured system availability |
US6839759B2 (en) | 1998-10-30 | 2005-01-04 | Science Applications International Corp. | Method for establishing secure communication link between computers of virtual private network without user entering any cryptographic information |
US8560705B2 (en) | 1998-10-30 | 2013-10-15 | Virnetx, Inc. | System and method employing an agile network protocol for secure communications using secure domain names |
US8554899B2 (en) | 1998-10-30 | 2013-10-08 | Virnetx, Inc. | Agile network protocol for secure communications using secure domain names |
US6834310B2 (en) | 1998-10-30 | 2004-12-21 | Science Applications International Corp. | Preventing packet flooding of a computer on a computer network |
US20110238993A1 (en) * | 1998-10-30 | 2011-09-29 | Virnetx, Inc. | Agile Network Protocol For Secure Communications With Assured System Availability |
US6826616B2 (en) | 1998-10-30 | 2004-11-30 | Science Applications International Corp. | Method for establishing secure communication link between computers of virtual private network |
US9860283B2 (en) | 1998-10-30 | 2018-01-02 | Virnetx, Inc. | Agile network protocol for secure video communications with assured system availability |
US8051181B2 (en) | 1998-10-30 | 2011-11-01 | Virnetx, Inc. | Method for establishing secure communication link between computers of virtual private network |
US8521888B2 (en) | 1998-10-30 | 2013-08-27 | Virnetx, Inc. | System and method employing an agile network protocol for secure communications using secure domain names |
US9967240B2 (en) | 1998-10-30 | 2018-05-08 | Virnetx, Inc. | Agile network protocol for secure communications using secure domain names |
US8516131B2 (en) | 1998-10-30 | 2013-08-20 | Virnetx, Inc. | System and method employing an agile network protocol for secure communications using secure domain names |
US8516117B2 (en) | 1998-10-30 | 2013-08-20 | Virnetx, Inc. | Agile network protocol for secure communications with assured system availability |
US10187387B2 (en) | 1998-10-30 | 2019-01-22 | Virnetx, Inc. | Method for establishing connection between devices |
US20040098485A1 (en) * | 1998-10-30 | 2004-05-20 | Science Applications International Corporation | Agile network protocol for secure communications using secure domain names |
US8504696B2 (en) | 1998-10-30 | 2013-08-06 | Virnetx, Inc. | System and method employing an agile network protocol for secure communications using secure domain names |
US20040107285A1 (en) * | 1998-10-30 | 2004-06-03 | Science Applications International Corporation | Method for establishing secure communication link between computers of virtual private network |
US8504697B2 (en) | 1998-10-30 | 2013-08-06 | Virnetx, Inc. | System and method employing an agile network protocol for secure communications using secure domain names |
US8458341B2 (en) | 1998-10-30 | 2013-06-04 | Virnetx, Inc. | System and method employing an agile network protocol for secure communications using secure domain names |
US6493349B1 (en) * | 1998-11-13 | 2002-12-10 | Nortel Networks Limited | Extended internet protocol virtual private network architectures |
US6205488B1 (en) * | 1998-11-13 | 2001-03-20 | Nortel Networks Limited | Internet protocol virtual private network realization using multi-protocol label switching tunnels |
US6636898B1 (en) * | 1999-01-29 | 2003-10-21 | International Business Machines Corporation | System and method for central management of connections in a virtual private network |
US10361802B1 (en) | 1999-02-01 | 2019-07-23 | Blanding Hovenweep, Llc | Adaptive pattern recognition based control system and method |
US9503419B2 (en) * | 1999-02-24 | 2016-11-22 | Guest Tek Interactive Entertainment Ltd. | Methods and apparatus for providing high speed connectivity to a hotel environment |
US9705846B2 (en) * | 1999-02-24 | 2017-07-11 | Guest Tek Interactive Entertainment Ltd. | Methods and apparatus for providing high speed connectivity to a hotel environment |
US20140289410A1 (en) * | 1999-02-24 | 2014-09-25 | Guest Tek Interactive Entertainment Ltd. | Methods and apparatus for providing high speed connectivity to a hotel environment |
US20170339104A1 (en) * | 1999-02-24 | 2017-11-23 | Guest Tek Interactive Entertainment Ltd. | Methods and apparatus for providing high speed connectivity to a hotel environment |
US9025599B2 (en) * | 1999-02-24 | 2015-05-05 | Guest Tek Interactive Entertainment Ltd. | Methods and apparatus for providing high speed connectivity to a hotel environment |
US20150237004A1 (en) * | 1999-02-24 | 2015-08-20 | Guest Tek Interactive Entertainment Ltd. | Methods and apparatus for providing high speed connectivity to a hotel environment |
US10164940B2 (en) * | 1999-02-24 | 2018-12-25 | Guest Tek Interactive Entertainment Ltd. | Methods and apparatus for providing high speed connectivity to a hotel environment |
US6434627B1 (en) * | 1999-03-15 | 2002-08-13 | Cisco Technology, Inc. | IP network for accomodating mobile users with incompatible network addressing |
US6865613B1 (en) | 1999-03-15 | 2005-03-08 | Cisco Technology, Inc. | IP network for accomodating mobile users with incompatible network addressing |
US7831689B2 (en) | 1999-04-02 | 2010-11-09 | Nortel Networks Corporation | Virtual private network manager GUI with links for use in configuring a virtual private network |
US7000014B2 (en) * | 1999-04-02 | 2006-02-14 | Nortel Networks Limited | Monitoring a virtual private network |
US6701358B1 (en) | 1999-04-02 | 2004-03-02 | Nortel Networks Limited | Bulk configuring a virtual private network |
US20050022183A1 (en) * | 1999-04-02 | 2005-01-27 | Poisson Matthew W. | Virtual private network manager GUI with links for use in configuring a virtual private network |
US20030033401A1 (en) * | 1999-04-02 | 2003-02-13 | Matthew W. Poisson | Monitoring a virtual private network |
US6765591B2 (en) * | 1999-04-02 | 2004-07-20 | Nortel Networks Limited | Managing a virtual private network |
US20040199624A1 (en) * | 1999-04-02 | 2004-10-07 | Poisson Matthew W. | Managing a virtual private network |
US6662221B1 (en) * | 1999-04-12 | 2003-12-09 | Lucent Technologies Inc. | Integrated network and service management with automated flow through configuration and provisioning of virtual private networks |
US7213262B1 (en) | 1999-05-10 | 2007-05-01 | Sun Microsystems, Inc. | Method and system for proving membership in a nested group using chains of credentials |
US6883100B1 (en) * | 1999-05-10 | 2005-04-19 | Sun Microsystems, Inc. | Method and system for dynamic issuance of group certificates |
USRE43163E1 (en) | 1999-05-14 | 2012-02-07 | Brookline Flolmstead Llc | High-speed network of independently linked nodes |
US7127506B1 (en) * | 1999-05-28 | 2006-10-24 | Teradyne, Inc. | PC configuration fault analysis |
US6442448B1 (en) * | 1999-06-04 | 2002-08-27 | Radiant Systems, Inc. | Fuel dispensing home phone network alliance (home PNA) based system |
US20020019932A1 (en) * | 1999-06-10 | 2002-02-14 | Eng-Whatt Toh | Cryptographically secure network |
US20020101998A1 (en) * | 1999-06-10 | 2002-08-01 | Chee-Hong Wong | Fast escrow delivery |
US20150271140A1 (en) * | 1999-06-15 | 2015-09-24 | Tectia Oyj | Tunnelling of Information |
US6963925B1 (en) * | 1999-06-24 | 2005-11-08 | Matsushita Electric Industrial Co., Ltd. | Gateway apparatus and the method thereof |
US20080141349A1 (en) * | 1999-07-14 | 2008-06-12 | Symantec Corporation | System and method for computer security |
US8549640B2 (en) | 1999-07-14 | 2013-10-01 | Symantec Corporation | System and method for computer security |
US7854005B2 (en) | 1999-07-14 | 2010-12-14 | Symantec Corporation | System and method for generating fictitious content for a computer |
US7827605B2 (en) | 1999-07-14 | 2010-11-02 | Symantec Corporation | System and method for preventing detection of a selected process running on a computer |
US20090064331A1 (en) * | 1999-07-14 | 2009-03-05 | Symantec Corporation | System and method for preventing detection of a selected process running on a computer |
US20060031935A1 (en) * | 1999-07-14 | 2006-02-09 | Symantec Corporation | System and method for computer security |
US7356844B2 (en) | 1999-07-14 | 2008-04-08 | Symantec Corporation | System and method for computer security |
US20070061883A1 (en) * | 1999-07-14 | 2007-03-15 | Symantec Corporation | System and method for generating fictitious content for a computer |
US6981155B1 (en) | 1999-07-14 | 2005-12-27 | Symantec Corporation | System and method for computer security |
WO2001004759A1 (en) * | 1999-07-14 | 2001-01-18 | Recourse Technologies, Inc. | System and method for computer security |
US7100195B1 (en) | 1999-07-30 | 2006-08-29 | Accenture Llp | Managing user information on an e-commerce system |
US6704873B1 (en) * | 1999-07-30 | 2004-03-09 | Accenture Llp | Secure gateway interconnection in an e-commerce based environment |
US20040093431A1 (en) * | 1999-08-26 | 2004-05-13 | Genty Denise Marie | Method and system for algorithm-based address-evading network snoop avoider |
US8578490B2 (en) | 1999-08-30 | 2013-11-05 | Symantec Corporation | System and method for using timestamps to detect attacks |
US20070157315A1 (en) * | 1999-08-30 | 2007-07-05 | Symantec Corporation | System and method for using timestamps to detect attacks |
US7072964B1 (en) * | 1999-08-31 | 2006-07-04 | Science Applications International Corporation | System and method for interconnecting multiple virtual private networks |
US20060227786A1 (en) * | 1999-08-31 | 2006-10-12 | Science Applications International Corporation | System and Method for Interconnecting Multiple Virtual Private Networks |
US6577327B1 (en) * | 1999-09-15 | 2003-06-10 | Nortel Networks Limited | System, method and graphical user interface for building virtual private networks |
US20030088699A1 (en) * | 1999-11-04 | 2003-05-08 | James V. Luciani | System, device, and method for supporting virtual private networks in a label switched communication network |
US20060077977A1 (en) * | 1999-12-10 | 2006-04-13 | Sun Microsystems, Inc. | System and method for separating addresses from the delivery scheme in a virtual private network |
US7765581B1 (en) * | 1999-12-10 | 2010-07-27 | Oracle America, Inc. | System and method for enabling scalable security in a virtual private network |
US7336790B1 (en) | 1999-12-10 | 2008-02-26 | Sun Microsystems Inc. | Decoupling access control from key management in a network |
US6977929B1 (en) | 1999-12-10 | 2005-12-20 | Sun Microsystems, Inc. | Method and system for facilitating relocation of devices on a network |
US6970941B1 (en) | 1999-12-10 | 2005-11-29 | Sun Microsystems, Inc. | System and method for separating addresses from the delivery scheme in a virtual private network |
US7685309B2 (en) | 1999-12-10 | 2010-03-23 | Sun Microsystems, Inc. | System and method for separating addresses from the delivery scheme in a virtual private network |
US6938169B1 (en) | 1999-12-10 | 2005-08-30 | Sun Microsystems, Inc. | Channel-specific file system views in a private network using a public-network infrastructure |
US7072407B2 (en) | 2000-01-31 | 2006-07-04 | Brookline Flolmstead Llc | Combination power and full duplex data cable |
US7835350B2 (en) | 2000-02-09 | 2010-11-16 | Anderson Keith R | Prioritizing data transmissions using the number of associated origin addresses |
US20010025301A1 (en) * | 2000-02-09 | 2001-09-27 | Anderson Keith R. | Packet prioritization protocol for a large-scale, high speed computer network |
US6931003B2 (en) | 2000-02-09 | 2005-08-16 | Bookline Flolmstead Llc | Packet prioritization protocol for a large-scale, high speed computer network |
US20050249116A1 (en) * | 2000-02-09 | 2005-11-10 | Anderson Keith R | System and method for prioritizing data transmissions |
US20070121634A1 (en) * | 2000-02-09 | 2007-05-31 | Brookline Flolmstead Llc | System and method for distributing addresses |
US7130629B1 (en) | 2000-03-08 | 2006-10-31 | Cisco Technology, Inc. | Enabling services for multiple sessions using a single mobile node |
US7240202B1 (en) * | 2000-03-16 | 2007-07-03 | Novell, Inc. | Security context sharing |
US7957965B2 (en) | 2000-03-28 | 2011-06-07 | Tellabs Operations, Inc. | Communication system noise cancellation power signal calculation techniques |
US20090024387A1 (en) * | 2000-03-28 | 2009-01-22 | Tellabs Operations, Inc. | Communication system noise cancellation power signal calculation techniques |
US7058798B1 (en) | 2000-04-11 | 2006-06-06 | Sun Microsystems, Inc. | Method ans system for pro-active credential refreshing |
US7069592B2 (en) | 2000-04-26 | 2006-06-27 | Ford Global Technologies, Llc | Web-based document system |
US20020016926A1 (en) * | 2000-04-27 | 2002-02-07 | Nguyen Thomas T. | Method and apparatus for integrating tunneling protocols with standard routing protocols |
WO2001082097A1 (en) * | 2000-04-27 | 2001-11-01 | Fortress Technologies, Inc. | A method and apparatus for integrating tunneling protocols with standard routing protocols |
US6976071B1 (en) * | 2000-05-03 | 2005-12-13 | Nortel Networks Limited | Detecting if a secure link is alive |
US20030051195A1 (en) * | 2000-05-05 | 2003-03-13 | Bosa Patrick A. | Systems and methods for isolating faults in computer networks |
US20040078683A1 (en) * | 2000-05-05 | 2004-04-22 | Buia Christhoper A. | Systems and methods for managing and analyzing faults in computer networks |
US20030149919A1 (en) * | 2000-05-05 | 2003-08-07 | Joseph Greenwald | Systems and methods for diagnosing faults in computer networks |
US20030046390A1 (en) * | 2000-05-05 | 2003-03-06 | Scott Ball | Systems and methods for construction multi-layer topological models of computer networks |
US7237138B2 (en) | 2000-05-05 | 2007-06-26 | Computer Associates Think, Inc. | Systems and methods for diagnosing faults in computer networks |
US7752024B2 (en) | 2000-05-05 | 2010-07-06 | Computer Associates Think, Inc. | Systems and methods for constructing multi-layer topological models of computer networks |
US7103807B2 (en) | 2000-05-05 | 2006-09-05 | Computer Associates Think, Inc. | Systems and methods for isolating faults in computer networks |
US7500143B2 (en) | 2000-05-05 | 2009-03-03 | Computer Associates Think, Inc. | Systems and methods for managing and analyzing faults in computer networks |
US20030056140A1 (en) * | 2000-05-05 | 2003-03-20 | Taylor David K. | Help desk systems and methods for use with communications networks |
US7281170B2 (en) | 2000-05-05 | 2007-10-09 | Computer Associates Think, Inc. | Help desk systems and methods for use with communications networks |
US7020696B1 (en) * | 2000-05-20 | 2006-03-28 | Ciena Corp. | Distributed user management information in telecommunications networks |
US20020099939A1 (en) * | 2000-05-24 | 2002-07-25 | Hewlett-Packard Company | Internet key exchange |
US20030212904A1 (en) * | 2000-05-25 | 2003-11-13 | Randle William M. | Standardized transmission and exchange of data with security and non-repudiation functions |
US7568222B2 (en) | 2000-05-25 | 2009-07-28 | Randle William M | Standardized transmission and exchange of data with security and non-repudiation functions |
US6988199B2 (en) | 2000-07-07 | 2006-01-17 | Message Secure | Secure and reliable document delivery |
US7251728B2 (en) | 2000-07-07 | 2007-07-31 | Message Secure Corporation | Secure and reliable document delivery using routing lists |
US20020004902A1 (en) * | 2000-07-07 | 2002-01-10 | Eng-Whatt Toh | Secure and reliable document delivery |
US6647109B1 (en) * | 2000-07-21 | 2003-11-11 | Conexant Systems, Inc. | Network telephony |
KR20020011262A (en) * | 2000-08-01 | 2002-02-08 | 서평원 | Virtual Private Network System In Mobile Communication System |
US6823462B1 (en) | 2000-09-07 | 2004-11-23 | International Business Machines Corporation | Virtual private network with multiple tunnels associated with one group name |
US20020048372A1 (en) * | 2000-10-19 | 2002-04-25 | Eng-Whatt Toh | Universal signature object for digital data |
US7403980B2 (en) * | 2000-11-08 | 2008-07-22 | Sri International | Methods and apparatus for scalable, distributed management of virtual private networks |
US20020055989A1 (en) * | 2000-11-08 | 2002-05-09 | Stringer-Calvert David W.J. | Methods and apparatus for scalable, distributed management of virtual private networks |
US6894999B1 (en) * | 2000-11-17 | 2005-05-17 | Advanced Micro Devices, Inc. | Combining VLAN tagging with other network protocols allows a user to transfer data on a network with enhanced security |
US6986061B1 (en) | 2000-11-20 | 2006-01-10 | International Business Machines Corporation | Integrated system for network layer security and fine-grained identity-based access control |
US7308713B1 (en) * | 2000-11-22 | 2007-12-11 | Intel Corporation | Link-lock device and method of monitoring and controlling a link for failures and intrusions |
US20040054902A1 (en) * | 2000-12-06 | 2004-03-18 | Yoshinori Fujimoto | Virtual private network |
US7181519B2 (en) * | 2000-12-11 | 2007-02-20 | Silverback Technologies, Inc. | Distributed network monitoring and control system |
US20020052950A1 (en) * | 2000-12-11 | 2002-05-02 | Silverback Technologies, Inc. | Distributed network monitoring and control system |
US7269639B1 (en) * | 2000-12-13 | 2007-09-11 | Cisco Technology, Inc. | Method and system to provide secure in-band management for a packet data network |
US6931529B2 (en) | 2001-01-05 | 2005-08-16 | International Business Machines Corporation | Establishing consistent, end-to-end protection for a user datagram |
US8780906B2 (en) | 2001-01-18 | 2014-07-15 | Virnetx, Inc. | Third party VPN certification |
EP2264952A3 (en) * | 2001-01-18 | 2012-03-21 | VirnetX Inc. | Third party VPN certification |
US7986688B2 (en) | 2001-01-18 | 2011-07-26 | Vimetx, Inc. | Third party VPN certification |
US7209479B2 (en) | 2001-01-18 | 2007-04-24 | Science Application International Corp. | Third party VPN certification |
US9954686B2 (en) | 2001-01-18 | 2018-04-24 | Virnetx, Inc. | Systems and methods for certifying devices to communicate securely |
EP1360803A1 (en) * | 2001-01-18 | 2003-11-12 | Science Applications International Corporation | Third party vpn certification |
US20140269431A1 (en) * | 2001-01-18 | 2014-09-18 | Virnetx, Inc. | Third party vpn certification |
WO2002058339A1 (en) * | 2001-01-18 | 2002-07-25 | Science Applications International Corporation | Third party vpn certification |
US9143490B2 (en) | 2001-01-18 | 2015-09-22 | Virnetx, Inc. | Systems and methods for certifying devices to communicate securely |
US8780905B2 (en) | 2001-01-18 | 2014-07-15 | Virnetx, Inc. | Third party VPN certification |
US8761168B2 (en) | 2001-01-18 | 2014-06-24 | Virnetx, Inc. | Third party VPN certification |
US20080040794A1 (en) * | 2001-01-18 | 2008-02-14 | Virnetx, Inc. | Third party vpn certification |
US8571025B2 (en) | 2001-01-18 | 2013-10-29 | Virnetx, Inc. | Third party VPN certification |
EP1360803A4 (en) * | 2001-01-18 | 2005-03-16 | Science Applic Int Corp | Third party vpn certification |
US20020093915A1 (en) * | 2001-01-18 | 2002-07-18 | Victor Larson | Third party VPN certification |
US7944915B2 (en) | 2001-01-18 | 2011-05-17 | VirtnetX, Inc. | Third party VPN certification |
US9673988B2 (en) | 2001-01-18 | 2017-06-06 | Virnetx, Inc. | Systems and methods for certifying devices to communicate securely |
EP2264951A3 (en) * | 2001-01-18 | 2012-03-21 | VirnetX Inc. | Third party VPN certification |
US10680830B2 (en) | 2001-01-18 | 2020-06-09 | Virnetx, Inc. | Systems and methods for certifying devices to communicate securely |
US20020099668A1 (en) * | 2001-01-22 | 2002-07-25 | Sun Microsystems, Inc. | Efficient revocation of registration authorities |
US7391782B2 (en) * | 2001-03-06 | 2008-06-24 | Fujitsu Limited | Packet relaying apparatus and relaying method with next relaying address collation |
US20020126667A1 (en) * | 2001-03-06 | 2002-09-12 | Naoki Oguchi | Packet relaying apparatus and relaying method |
US6778498B2 (en) | 2001-03-20 | 2004-08-17 | Mci, Inc. | Virtual private network (VPN)-aware customer premises equipment (CPE) edge router |
US7809860B2 (en) | 2001-03-20 | 2010-10-05 | Verizon Business Global Llc | System, method and apparatus that isolate virtual private network (VPN) and best effort traffic to resist denial of service attacks |
US8543734B2 (en) | 2001-03-20 | 2013-09-24 | Verizon Business Global Llc | System, method and apparatus that isolate virtual private network (VPN) and best effort traffic to resist denial of service attacks |
US20040208122A1 (en) * | 2001-03-20 | 2004-10-21 | Mcdysan David E. | Virtual private network (VPN)-aware customer premises equipment (CPE) edge router |
US9009812B2 (en) * | 2001-03-20 | 2015-04-14 | Verizon Patent And Licensing Inc. | System, method and apparatus that employ virtual private networks to resist IP QoS denial of service attacks |
US20130283379A1 (en) * | 2001-03-20 | 2013-10-24 | Verizon Corporate Services Group Inc. | System, method and apparatus that employ virtual private networks to resist ip qos denial of service attacks |
US20050066053A1 (en) * | 2001-03-20 | 2005-03-24 | Worldcom, Inc. | System, method and apparatus that isolate virtual private network (VPN) and best effort traffic to resist denial of service attacks |
US7447151B2 (en) | 2001-03-20 | 2008-11-04 | Verizon Business Global Llc | Virtual private network (VPN)-aware customer premises equipment (CPE) edge router |
US9419951B1 (en) | 2001-03-23 | 2016-08-16 | St. Luke Technologies, Llc | System and method for secure three-party communications |
US8904181B1 (en) | 2001-03-23 | 2014-12-02 | David P. Felsher | System and method for secure three-party communications |
US20020138635A1 (en) * | 2001-03-26 | 2002-09-26 | Nec Usa, Inc. | Multi-ISP controlled access to IP networks, based on third-party operated untrusted access stations |
FR2823389A1 (en) * | 2001-04-05 | 2002-10-11 | Schlumberger Systems & Service | High level language application downloading method for mobile phone involves replacing codes by reference to those codes to produce a compressed application |
WO2002082261A2 (en) * | 2001-04-05 | 2002-10-17 | Schlumberger Systèmes | Compression of codes of an application written in high-level language, for use in mobile telephony. |
WO2002082261A3 (en) * | 2001-04-05 | 2003-01-03 | Schlumberger Systems & Service | Compression of codes of an application written in high-level language, for use in mobile telephony. |
US20020154635A1 (en) * | 2001-04-23 | 2002-10-24 | Sun Microsystems, Inc. | System and method for extending private networks onto public infrastructure using supernets |
US7379987B2 (en) | 2001-04-24 | 2008-05-27 | Hitachi, Ltd. | Integrated service management system |
US20100146098A1 (en) * | 2001-04-24 | 2010-06-10 | Hitachi, Ltd | Intergrated service management system |
US7693980B2 (en) | 2001-04-24 | 2010-04-06 | Hitachi, Ltd. | Integrated service management system |
US7099912B2 (en) * | 2001-04-24 | 2006-08-29 | Hitachi, Ltd. | Integrated service management system |
US20020174211A1 (en) * | 2001-04-24 | 2002-11-21 | Takeshi Ishizaki | Integrated service management system |
US20080043764A1 (en) * | 2001-04-24 | 2008-02-21 | Hitachi, Ltd. | Integrated service management system |
US7962601B2 (en) | 2001-04-24 | 2011-06-14 | Hitachi, Ltd. | Intergrated service management system |
US20020156828A1 (en) * | 2001-04-24 | 2002-10-24 | Takeshi Ishizaki | Integrated service management system |
US20030126468A1 (en) * | 2001-05-25 | 2003-07-03 | Markham Thomas R. | Distributed firewall system and method |
US7536715B2 (en) | 2001-05-25 | 2009-05-19 | Secure Computing Corporation | Distributed firewall system and method |
US7216173B2 (en) * | 2001-06-12 | 2007-05-08 | Varian Medical Systems Technologies, Inc. | Virtual private network software system |
US20020199007A1 (en) * | 2001-06-12 | 2002-12-26 | Tom Clayton | Virtual private network software system |
US20030009699A1 (en) * | 2001-06-13 | 2003-01-09 | Gupta Ramesh M. | Method and apparatus for detecting intrusions on a computer system |
US7624444B2 (en) * | 2001-06-13 | 2009-11-24 | Mcafee, Inc. | Method and apparatus for detecting intrusions on a computer system |
US7827278B2 (en) * | 2001-07-23 | 2010-11-02 | At&T Intellectual Property Ii, L.P. | System for automated connection to virtual private networks related applications |
US20030200321A1 (en) * | 2001-07-23 | 2003-10-23 | Yihsiu Chen | System for automated connection to virtual private networks related applications |
US20030028650A1 (en) * | 2001-07-23 | 2003-02-06 | Yihsiu Chen | Flexible automated connection to virtual private networks |
US8239531B1 (en) * | 2001-07-23 | 2012-08-07 | At&T Intellectual Property Ii, L.P. | Method and apparatus for connection to virtual private networks for secure transactions |
US7827292B2 (en) * | 2001-07-23 | 2010-11-02 | At&T Intellectual Property Ii, L.P. | Flexible automated connection to virtual private networks |
US8676916B2 (en) | 2001-07-23 | 2014-03-18 | At&T Intellectual Property Ii, L.P. | Method and apparatus for connection to virtual private networks for secure transactions |
US7036143B1 (en) * | 2001-09-19 | 2006-04-25 | Cisco Technology, Inc. | Methods and apparatus for virtual private network based mobility |
US7246373B1 (en) | 2001-09-19 | 2007-07-17 | Cisco Technology, Inc. | Methods and apparatus for virtual private network based mobility |
US7464152B2 (en) | 2001-09-20 | 2008-12-09 | Hitachi, Ltd. | Integrated service management system for remote customer support |
US7085827B2 (en) | 2001-09-20 | 2006-08-01 | Hitachi, Ltd. | Integrated service management system for remote customer support |
US20030055933A1 (en) * | 2001-09-20 | 2003-03-20 | Takeshi Ishizaki | Integrated service management system for remote customer support |
US20060242290A1 (en) * | 2001-09-20 | 2006-10-26 | Hitachi, Ltd. | Integrated service management system for remote customer support |
US20030065950A1 (en) * | 2001-09-28 | 2003-04-03 | Yarborough William Jordan | Secured FTP architecture |
US7308710B2 (en) | 2001-09-28 | 2007-12-11 | Jp Morgan Chase Bank | Secured FTP architecture |
US20090287810A1 (en) * | 2001-10-05 | 2009-11-19 | Stonesoft Corporation | Virtual private network management |
US20030070091A1 (en) * | 2001-10-05 | 2003-04-10 | Loveland Shawn Domenic | Granular authorization for network user sessions |
US20030069958A1 (en) * | 2001-10-05 | 2003-04-10 | Mika Jalava | Virtual private network management |
EP1304830A2 (en) * | 2001-10-05 | 2003-04-23 | Stonesoft Corporation | Virtual private network management |
EP1304830A3 (en) * | 2001-10-05 | 2003-08-13 | Stonesoft Corporation | Virtual private network management |
US7076797B2 (en) * | 2001-10-05 | 2006-07-11 | Microsoft Corporation | Granular authorization for network user sessions |
US8019850B2 (en) * | 2001-10-05 | 2011-09-13 | Stonesoft Corporation | Virtual private network management |
US8045565B1 (en) | 2001-11-20 | 2011-10-25 | Brookline Flolmstead Llc | Method and apparatus for an environmentally hardened ethernet network system |
US20030115480A1 (en) * | 2001-12-17 | 2003-06-19 | Worldcom, Inc. | System, method and apparatus that employ virtual private networks to resist IP QoS denial of service attacks |
EP1322070A3 (en) * | 2001-12-19 | 2010-02-03 | Alcatel Canada Inc. | System and method for managing information for elements in a communication network |
EP1322070A2 (en) * | 2001-12-19 | 2003-06-25 | Alcatel Canada Inc. | System and method for managing information for elements in a communication network |
US20030128695A1 (en) * | 2002-01-04 | 2003-07-10 | Samsung Electronics Co., Ltd. | Home gateway for executing a function of a security protocol and a method thereof |
US7440465B2 (en) * | 2002-01-04 | 2008-10-21 | Samsung Electronics Co., Ltd. | Home gateway for executing a function of a security protocol and a method thereof |
US20030172264A1 (en) * | 2002-01-28 | 2003-09-11 | Hughes Electronics | Method and system for providing security in performance enhanced network |
US20090080399A1 (en) * | 2002-02-20 | 2009-03-26 | Cisco Technology, Inc., A Corporation Of California | Methods and apparatus for supporting proxy mobile ip registration in a wireless local area network |
US7471661B1 (en) | 2002-02-20 | 2008-12-30 | Cisco Technology, Inc. | Methods and apparatus for supporting proxy mobile IP registration in a wireless local area network |
US8422467B2 (en) | 2002-02-20 | 2013-04-16 | Cisco Technology, Inc. | Methods and apparatus for supporting proxy mobile IP registration in a wireless local area network |
US20040044753A1 (en) * | 2002-02-27 | 2004-03-04 | Lucida, Inc. | Method and system for dynamic business management of a network |
KR100485801B1 (en) * | 2002-03-07 | 2005-04-28 | 삼성전자주식회사 | Network connecting apparatus and method for offering direct connection between network devices existing different private networks |
US7478167B2 (en) | 2002-03-18 | 2009-01-13 | Nortel Networks Limited | Resource allocation using an auto-discovery mechanism for provider-provisioned layer-2 and layer-3 virtual private networks |
US20030177221A1 (en) * | 2002-03-18 | 2003-09-18 | Hamid Ould-Brahim | Resource allocation using an auto-discovery mechanism for provider-provisioned layer-2 and layer-3 Virtual Private Networks |
WO2003079614A1 (en) * | 2002-03-18 | 2003-09-25 | Nortel Networks Limited | Resource allocation using an auto-discovery mechanism for provider-provisioned layer-2 and layer-3 virtual private networks |
US20070016947A1 (en) * | 2002-04-04 | 2007-01-18 | Joel Balissat | Method and system for securely scanning network traffic |
US20070169187A1 (en) * | 2002-04-04 | 2007-07-19 | Joel Balissat | Method and system for securely scanning network traffic |
US8136152B2 (en) | 2002-04-04 | 2012-03-13 | Worcester Technologies Llc | Method and system for securely scanning network traffic |
US20070180514A1 (en) * | 2002-04-04 | 2007-08-02 | Joel Balissat | Multipoint server for providing secure, scaleable connections between a plurality of network devices |
US7562386B2 (en) | 2002-04-04 | 2009-07-14 | At&T Intellectual Property, Ii, L.P. | Multipoint server for providing secure, scaleable connections between a plurality of network devices |
US7448081B2 (en) | 2002-04-04 | 2008-11-04 | At&T Intellectual Property Ii, L.P. | Method and system for securely scanning network traffic |
US7543332B2 (en) | 2002-04-04 | 2009-06-02 | At&T Corporation | Method and system for securely scanning network traffic |
FR2838851A1 (en) * | 2002-04-17 | 2003-10-24 | France Telecom | METHOD AND SYSTEM FOR DETERMINING THE OPERATING PARAMETERS OF AN INFORMATION TRANSMISSION NETWORK FOR CREATING, IN THIS NETWORK, A VIRTUAL NETWORK |
EP1355449A1 (en) * | 2002-04-17 | 2003-10-22 | France Telecom | Method and system for determining the parameters of a data transmission network for creating, in that network, a virtual private network |
US20030217126A1 (en) * | 2002-05-14 | 2003-11-20 | Polcha Andrew J. | System and method for automatically configuring remote computer |
KR100485769B1 (en) * | 2002-05-14 | 2005-04-28 | 삼성전자주식회사 | Apparatus and method for offering connection between network devices located in different home networks |
US7246232B2 (en) | 2002-05-31 | 2007-07-17 | Sri International | Methods and apparatus for scalable distributed management of wireless virtual private networks |
US20030226013A1 (en) * | 2002-05-31 | 2003-12-04 | Sri International | Methods and apparatus for scalable distributed management of wireless virtual private networks |
US20030233576A1 (en) * | 2002-06-13 | 2003-12-18 | Nvidia Corp. | Detection of support for security protocol and address translation integration |
US7496950B2 (en) | 2002-06-13 | 2009-02-24 | Engedi Technologies, Inc. | Secure remote management appliance |
US20030233583A1 (en) * | 2002-06-13 | 2003-12-18 | Carley Jeffrey Alan | Secure remote management appliance |
US8474016B2 (en) | 2002-06-13 | 2013-06-25 | Infinite Bay Telecom Limited Liability Company | Secure management access control for computers, embedded and card embodiment |
US7171467B2 (en) | 2002-06-13 | 2007-01-30 | Engedi Technologies, Inc. | Out-of-band remote management station |
US20030233450A1 (en) * | 2002-06-13 | 2003-12-18 | Carley Jeffrey Alan | Out-of-band remote management station |
US7886340B2 (en) | 2002-06-13 | 2011-02-08 | Engedi Technologies | Secure remote management appliance |
US8745219B2 (en) | 2002-06-13 | 2014-06-03 | Infinite Bay Telecom Limited Liability Company | Out-of-band remote management station |
US20080072291A1 (en) * | 2002-06-13 | 2008-03-20 | Carley Jeffrey A | Secure management access control for computers, embedded and card embodiment |
US7191331B2 (en) * | 2002-06-13 | 2007-03-13 | Nvidia Corporation | Detection of support for security protocol and address translation integration |
US20090150977A1 (en) * | 2002-06-13 | 2009-06-11 | Engedi Technologies, Inc. | Secure remote management appliance |
WO2004004217A1 (en) * | 2002-06-28 | 2004-01-08 | Viewgate Networks Limited | Virtual private network validator |
US7421736B2 (en) * | 2002-07-02 | 2008-09-02 | Lucent Technologies Inc. | Method and apparatus for enabling peer-to-peer virtual private network (P2P-VPN) services in VPN-enabled network |
US20040006708A1 (en) * | 2002-07-02 | 2004-01-08 | Lucent Technologies Inc. | Method and apparatus for enabling peer-to-peer virtual private network (P2P-VPN) services in VPN-enabled network |
US20040054769A1 (en) * | 2002-07-31 | 2004-03-18 | Alcatel | System for managing networks using rules and including an inference engine |
US8055742B2 (en) * | 2002-07-31 | 2011-11-08 | Alcatel Lucent | Network management system for managing networks and implementing services on the networks using rules and an inference engine |
US7594262B2 (en) | 2002-09-04 | 2009-09-22 | Secure Computing Corporation | System and method for secure group communications |
US20040044908A1 (en) * | 2002-09-04 | 2004-03-04 | Secure Computing Corporation | System and method for transmitting and receiving secure data in a virtual private group |
US7231664B2 (en) * | 2002-09-04 | 2007-06-12 | Secure Computing Corporation | System and method for transmitting and receiving secure data in a virtual private group |
US20040044891A1 (en) * | 2002-09-04 | 2004-03-04 | Secure Computing Corporation | System and method for secure group communications |
US7689722B1 (en) * | 2002-10-07 | 2010-03-30 | Cisco Technology, Inc. | Methods and apparatus for virtual private network fault tolerance |
US7308706B2 (en) | 2002-10-28 | 2007-12-11 | Secure Computing Corporation | Associative policy model |
US20040083382A1 (en) * | 2002-10-28 | 2004-04-29 | Secure Computing Corporation | Associative policy model |
US20040088542A1 (en) * | 2002-11-06 | 2004-05-06 | Olivier Daude | Virtual private network crossovers based on certificates |
US7574738B2 (en) * | 2002-11-06 | 2009-08-11 | At&T Intellectual Property Ii, L.P. | Virtual private network crossovers based on certificates |
US20040093492A1 (en) * | 2002-11-13 | 2004-05-13 | Olivier Daude | Virtual private network management with certificates |
US7421198B2 (en) | 2002-11-17 | 2008-09-02 | Huawei Technologies Co., Ltd. | Method for implementing the reconstruction of an optical network |
US20050265729A1 (en) * | 2002-11-17 | 2005-12-01 | Huawei Technologies Co., Ltd. | Method for implementing the reconstruction of an optical network |
WO2004047363A1 (en) * | 2002-11-17 | 2004-06-03 | Huawei Technologies Co., Ltd. | A method for realizing the reconstruction of optical network |
US7457289B2 (en) | 2002-12-16 | 2008-11-25 | Cisco Technology, Inc. | Inter-proxy communication protocol for mobile IP |
US20040120260A1 (en) * | 2002-12-18 | 2004-06-24 | Mark Bernier | Methods and apparatus for providing security to a computerized device |
AU2003299622B2 (en) * | 2002-12-18 | 2009-08-13 | Cisco Technology, Inc. | Method apparatus and computer program product for providing secured connection to a computerized device |
WO2004062231A1 (en) * | 2002-12-18 | 2004-07-22 | Cisco Technology, Inc. | Method apparatus and computer program product for providing secured connection to a computerized device |
US8122136B2 (en) * | 2002-12-18 | 2012-02-21 | Cisco Technology, Inc. | Methods and apparatus for providing security to a computerized device |
US9560521B2 (en) | 2003-01-14 | 2017-01-31 | Wi-Fi One, Llc | Service in WLAN inter-working, address management system, and method |
US9986426B2 (en) | 2003-01-14 | 2018-05-29 | Wi-Fi One, Llc | Service in WLAN inter-working, address management system, and method |
US8374580B2 (en) | 2003-01-14 | 2013-02-12 | Panasonic Corporation | Service in WLAN inter-working, address management system, and method |
US10511961B2 (en) | 2003-01-14 | 2019-12-17 | Wi-Fi One, Llc | Service in WLAN inter-working, address management system, and method |
US20100002668A1 (en) * | 2003-01-14 | 2010-01-07 | Panasonic Corporation | Service in wlan inter-working, address management system, and method |
US8081971B2 (en) * | 2003-01-14 | 2011-12-20 | Panasonic Corporation | Service in WLAN inter-working, address management system, and method |
US9055563B2 (en) | 2003-01-14 | 2015-06-09 | Wi-Fi One, Llc | Service in WLAN inter-working, address management system, and method |
US20040218611A1 (en) * | 2003-01-21 | 2004-11-04 | Samsung Electronics Co., Ltd. | Gateway for supporting communications between network devices of different private networks |
US7366188B2 (en) * | 2003-01-21 | 2008-04-29 | Samsung Electronics Co., Ltd. | Gateway for supporting communications between network devices of different private networks |
US7362742B1 (en) | 2003-01-28 | 2008-04-22 | Cisco Technology, Inc. | Methods and apparatus for synchronizing subnet mapping tables |
US8600830B2 (en) | 2003-02-05 | 2013-12-03 | Steven M. Hoffberg | System and method for providing a payment to a non-winning auction participant |
US10163137B2 (en) | 2003-02-05 | 2018-12-25 | Steven M. Hoffberg | System and method for incentivizing participation in a market transaction |
US11790413B2 (en) | 2003-02-05 | 2023-10-17 | Hoffberg Family Trust 2 | System and method for communication |
US9818136B1 (en) | 2003-02-05 | 2017-11-14 | Steven M. Hoffberg | System and method for determining contingent relevance |
US10943273B2 (en) | 2003-02-05 | 2021-03-09 | The Hoffberg Family Trust 2004-1 | System and method for determining contingent relevance |
US7447751B2 (en) * | 2003-02-06 | 2008-11-04 | Hewlett-Packard Development Company, L.P. | Method for deploying a virtual private network |
US20040158601A1 (en) * | 2003-02-06 | 2004-08-12 | Julie Wing | Method for deploying a virtual private network |
EP1460859A1 (en) * | 2003-03-19 | 2004-09-22 | Siemens Aktiengesellschaft | Method, system and apparatus for managing signaling connections in a telecommunications network |
US20040240397A1 (en) * | 2003-03-19 | 2004-12-02 | Siemens Aktiengesellschaft | Method, system and apparatus for managing connections in a telecommunications network |
EP1460860A1 (en) * | 2003-03-19 | 2004-09-22 | Siemens Aktiengesellschaft | Method, system and apparatus for managing bearer connections in a telecommunications network |
US7505432B2 (en) | 2003-04-28 | 2009-03-17 | Cisco Technology, Inc. | Methods and apparatus for securing proxy Mobile IP |
US8259676B2 (en) | 2003-04-28 | 2012-09-04 | Cisco Technology, Inc. | Methods and apparatus for securing proxy mobile IP |
US20040213260A1 (en) * | 2003-04-28 | 2004-10-28 | Cisco Technology, Inc. | Methods and apparatus for securing proxy Mobile IP |
US20090141688A1 (en) * | 2003-04-28 | 2009-06-04 | Cisco Technology, Inc. | Methods and apparatus for securing proxy mobile ip |
US20050055463A1 (en) * | 2003-05-16 | 2005-03-10 | Verilegal, Inc. | Secure internet functionality |
US20070058654A1 (en) * | 2003-07-10 | 2007-03-15 | Johann Arnold | Arrangement and coupling device for securing data access |
KR101022157B1 (en) | 2003-12-16 | 2011-03-17 | 주식회사 케이티 | Method for processing service in secure socket layer virtual private network |
US20050152393A1 (en) * | 2004-01-13 | 2005-07-14 | Wen-Chih Lin | Method of establishing connection between wireless communication devices |
EP1730939A4 (en) * | 2004-03-08 | 2010-08-11 | Alto Ventures Inc | Virtual call center |
EP1730939A2 (en) * | 2004-03-08 | 2006-12-13 | Wendell D. Brown | Virtual call center |
US7418092B2 (en) * | 2004-03-08 | 2008-08-26 | Alto Ventures, Inc. | Virtual call center |
US20050195962A1 (en) * | 2004-03-08 | 2005-09-08 | Brown Wendell D. | Virtual call center |
US7353537B2 (en) * | 2004-03-31 | 2008-04-01 | Novell, Inc. | Secure transparent virtual private networks |
US20050246519A1 (en) * | 2004-03-31 | 2005-11-03 | Novell, Inc. | Secure transparent virtual private networks |
US7447188B1 (en) | 2004-06-22 | 2008-11-04 | Cisco Technology, Inc. | Methods and apparatus for supporting mobile IP proxy registration in a system implementing mulitple VLANs |
US8713583B2 (en) | 2004-07-09 | 2014-04-29 | Dell Software Inc. | Systems and methods for managing policies on a computer |
US9130847B2 (en) | 2004-07-09 | 2015-09-08 | Dell Software, Inc. | Systems and methods for managing policies on a computer |
US8245242B2 (en) | 2004-07-09 | 2012-08-14 | Quest Software, Inc. | Systems and methods for managing policies on a computer |
US8533744B2 (en) | 2004-07-09 | 2013-09-10 | Dell Software, Inc. | Systems and methods for managing policies on a computer |
US7426384B2 (en) * | 2004-07-13 | 2008-09-16 | Vodafone Group Plc | Network communication system including a database of codes and corresponding telephone numbers |
US20060040664A1 (en) * | 2004-07-13 | 2006-02-23 | Murray Richard J | Communications systems |
US20060015450A1 (en) * | 2004-07-13 | 2006-01-19 | Wells Fargo Bank, N.A. | Financial services network and associated processes |
US20060090074A1 (en) * | 2004-10-22 | 2006-04-27 | Kazumine Matoba | Encryption communication system |
US7650500B2 (en) * | 2004-10-22 | 2010-01-19 | Fujitsu Limited | Encryption communication system |
US8640237B2 (en) | 2005-01-10 | 2014-01-28 | Mcafee, Inc. | Integrated firewall, IPS, and virus scanner system and method |
US8555389B2 (en) | 2005-01-10 | 2013-10-08 | Mcafee, Inc. | Integrated firewall, IPS, and virus scanner system and method |
US20060236095A1 (en) * | 2005-02-14 | 2006-10-19 | Smith Robert D | Systems and methods for automatically configuring and managing network devices and virtual private networks |
US20080046996A1 (en) * | 2005-02-14 | 2008-02-21 | Smith Robert D | Systems and Methods for Remotely Maintaining Virtual Private Networks |
US8136151B2 (en) | 2005-02-14 | 2012-03-13 | Anxebusiness Corp. | Systems and methods for remotely maintaining virtual private networks |
US7373661B2 (en) | 2005-02-14 | 2008-05-13 | Ethome, Inc. | Systems and methods for automatically configuring and managing network devices and virtual private networks |
US20070199066A1 (en) * | 2005-02-14 | 2007-08-23 | Smith Robert D | Systems and methods for automatically configuring network devices |
US7711947B2 (en) | 2005-02-14 | 2010-05-04 | Etsec, Inc. | Systems and methods for automatically reconfiguring virtual private networks |
US20080043640A1 (en) * | 2005-02-14 | 2008-02-21 | Smith Robert D | Systems and Methods for Automatically Reconfiguring Virtual Private Networks |
US20070277226A1 (en) * | 2005-02-14 | 2007-11-29 | Smith Robert D | Systems and methods for remotely maintaining network devices |
US7577130B2 (en) * | 2005-02-18 | 2009-08-18 | Microsoft Corporation | SyncML based OMA connectivity object to provision VPN connections |
US20060212937A1 (en) * | 2005-02-18 | 2006-09-21 | Microsoft Corporation | SyncML based OMA connectivity object to provision VPN connections |
US10387270B2 (en) | 2005-04-21 | 2019-08-20 | Justservice.Net Llc | Data backup, storage, transfer and retrieval system, method and computer program product |
US11436095B2 (en) | 2005-04-21 | 2022-09-06 | Justservice.Net Llc | Data backup, storage, transfer and retrieval system, method and computer program product |
US10476868B2 (en) | 2005-04-21 | 2019-11-12 | Justservice.Net Llc | Data backup and transfer system, method and computer program product |
US11425116B2 (en) | 2005-04-21 | 2022-08-23 | Justservice.Net Llc | Data backup and transfer system, method and computer program product |
GB2426141A (en) * | 2005-05-12 | 2006-11-15 | 3Com Corporaton | Configuration of Virtual Private Networks (VPNs) |
US7584299B2 (en) * | 2005-05-12 | 2009-09-01 | 3Com Corporation | Configuration of VPNs |
US20060259963A1 (en) * | 2005-05-12 | 2006-11-16 | 3Com Corporation | Configuration of VPNs |
US9794797B2 (en) | 2005-10-04 | 2017-10-17 | Steven M. Hoffberg | Multifactorial optimization system and method |
US10567975B2 (en) | 2005-10-04 | 2020-02-18 | Hoffberg Family Trust 2 | Multifactorial optimization system and method |
USRE49334E1 (en) | 2005-10-04 | 2022-12-13 | Hoffberg Family Trust 2 | Multifactorial optimization system and method |
US20070136805A1 (en) * | 2005-11-23 | 2007-06-14 | Ils Technology Llc | Business-to-business remote network connectivity |
USRE45327E1 (en) | 2005-12-19 | 2015-01-06 | Dell Software, Inc. | Apparatus, systems and methods to provide authentication services to a legacy application |
US7904949B2 (en) | 2005-12-19 | 2011-03-08 | Quest Software, Inc. | Apparatus, systems and methods to provide authentication services to a legacy application |
US20070150932A1 (en) * | 2005-12-28 | 2007-06-28 | Thomas Milligan | Systems and methods for providing secure access to embedded devices using a trust manager and a security broker |
US7614080B2 (en) * | 2005-12-28 | 2009-11-03 | Panasonic Electric Works Co., Ltd. | Systems and methods for providing secure access to embedded devices using a trust manager and a security broker |
US8584218B2 (en) | 2006-02-13 | 2013-11-12 | Quest Software, Inc. | Disconnected credential validation using pre-fetched service tickets |
US9288201B2 (en) | 2006-02-13 | 2016-03-15 | Dell Software Inc. | Disconnected credential validation using pre-fetched service tickets |
US8087075B2 (en) | 2006-02-13 | 2011-12-27 | Quest Software, Inc. | Disconnected credential validation using pre-fetched service tickets |
US8375421B1 (en) * | 2006-03-02 | 2013-02-12 | F5 Networks, Inc. | Enabling a virtual meeting room through a firewall on a network |
US7961722B1 (en) * | 2006-03-07 | 2011-06-14 | Juniper Networks, Inc. | Multiple virtualized operating environments within a VPN appliance |
US20070214232A1 (en) * | 2006-03-07 | 2007-09-13 | Nokia Corporation | System for Uniform Addressing of Home Resources Regardless of Remote Clients Network Location |
US20070226325A1 (en) * | 2006-03-23 | 2007-09-27 | Alcatel | Virtual private network service status management |
US20070234418A1 (en) * | 2006-03-30 | 2007-10-04 | Samsung Electronics Co., Ltd. | Method and apparatus of remote access message differentiation in VPN endpoint routers |
US7567511B1 (en) | 2006-05-10 | 2009-07-28 | At&T Intellectual Property Ii, L.P. | Method and apparatus for computing the cost of providing VPN service |
US20070271606A1 (en) * | 2006-05-17 | 2007-11-22 | Amann Keith R | Apparatus and method for establishing a VPN tunnel between a wireless device and a LAN |
US8978098B2 (en) | 2006-06-08 | 2015-03-10 | Dell Software, Inc. | Centralized user authentication system apparatus and method |
US8429712B2 (en) | 2006-06-08 | 2013-04-23 | Quest Software, Inc. | Centralized user authentication system apparatus and method |
US20070299940A1 (en) * | 2006-06-23 | 2007-12-27 | Microsoft Corporation | Public network distribution of software updates |
US8775572B2 (en) * | 2006-06-23 | 2014-07-08 | Microsoft Corporation | Public network distribution of software updates |
US9916150B2 (en) | 2006-06-23 | 2018-03-13 | Microsoft Technology Licensing, Llc | Public network distribution of software updates |
US20070299954A1 (en) * | 2006-06-27 | 2007-12-27 | International Business Machines Corporation | System, method and program for determining a network path by which to send a message |
US9137043B2 (en) * | 2006-06-27 | 2015-09-15 | International Business Machines Corporation | System, method and program for determining a network path by which to send a message |
US20090328192A1 (en) * | 2006-08-02 | 2009-12-31 | Alan Yang | Policy based VPN configuration for firewall/VPN security gateway appliance |
EP1885082A1 (en) * | 2006-08-02 | 2008-02-06 | O2 Micro, Inc. | Policy based VPN configuration for firewall/VPN security gateway applicance |
US7953070B1 (en) | 2006-08-17 | 2011-05-31 | Avaya Inc. | Client configuration download for VPN voice gateways |
US8522304B2 (en) * | 2006-09-08 | 2013-08-27 | Ibahn General Holdings Corporation | Monitoring and reporting policy compliance of home networks |
US20080066145A1 (en) * | 2006-09-08 | 2008-03-13 | Ibahn General Holdings, Inc. | Monitoring and reporting policy compliance of home networks |
US20080080517A1 (en) * | 2006-09-28 | 2008-04-03 | At & T Corp. | System and method for forwarding traffic data in an MPLS VPN |
US20080091763A1 (en) * | 2006-10-13 | 2008-04-17 | Quipa Holdings Limited | method for sharing functionality and/or data between two or more linked entities |
US8346908B1 (en) | 2006-10-30 | 2013-01-01 | Quest Software, Inc. | Identity migration apparatus and method |
US8086710B2 (en) | 2006-10-30 | 2011-12-27 | Quest Software, Inc. | Identity migration apparatus and method |
US7895332B2 (en) | 2006-10-30 | 2011-02-22 | Quest Software, Inc. | Identity migration system apparatus and method |
US8966045B1 (en) | 2006-10-30 | 2015-02-24 | Dell Software, Inc. | Identity migration apparatus and method |
US8160110B2 (en) * | 2007-01-16 | 2012-04-17 | Thomson Licensing | Device for generating a sampled ramp signal representative of a synchronization signal, and device for assisting the reconstruction of a synchronization signal, for a packet switching network |
US20080170588A1 (en) * | 2007-01-16 | 2008-07-17 | Thierry Tapie | Device for generating a sampled ramp signal representative of a synchronization signal, and device for assisting the reconstruction of a synchronization signal, for a packet switching network |
US20080222282A1 (en) * | 2007-03-05 | 2008-09-11 | Cisco Technology, Inc. | Analyzing virtual private network failures |
US8102758B2 (en) * | 2007-03-05 | 2012-01-24 | Cisco Technology, Inc. | Analyzing virtual private network failures |
US9860310B2 (en) | 2008-04-08 | 2018-01-02 | Geminare Inc. | System and method for providing data and application continuity in a computer system |
US11575736B2 (en) | 2008-04-08 | 2023-02-07 | Rps Canada Inc. | System and method for providing data and application continuity in a computer system |
US20110270949A1 (en) * | 2008-04-08 | 2011-11-03 | Geist Joshua B | System and method for providing data and application continuity in a computer system |
US11070612B2 (en) | 2008-04-08 | 2021-07-20 | Geminare Inc. | System and method for providing data and application continuity in a computer system |
US9674268B2 (en) | 2008-04-08 | 2017-06-06 | Geminare Incorporated | System and method for providing data and application continuity in a computer system |
US10110667B2 (en) | 2008-04-08 | 2018-10-23 | Geminare Inc. | System and method for providing data and application continuity in a computer system |
US20090319599A1 (en) * | 2008-06-18 | 2009-12-24 | Caunter Mark Leslie | Remote selection and authorization of collected media transmission |
US9680949B2 (en) | 2008-06-18 | 2017-06-13 | Qualcomm Incorporated | Remote selection and authorization of collected media transmission |
US8977710B2 (en) * | 2008-06-18 | 2015-03-10 | Qualcomm, Incorporated | Remote selection and authorization of collected media transmission |
US8155130B2 (en) * | 2008-08-05 | 2012-04-10 | Cisco Technology, Inc. | Enforcing the principle of least privilege for large tunnel-less VPNs |
US20100034207A1 (en) * | 2008-08-05 | 2010-02-11 | Mcgrew David | ENFORCING THE PRINCIPLE OF LEAST PRIVILEGE FOR LARGE TUNNEL-LESS VPNs |
US20100115604A1 (en) * | 2008-10-31 | 2010-05-06 | Alexandre Gerber | Methods and apparatus to dynamically control access from virtual private networks to network-based shared resources |
US8121118B2 (en) | 2008-10-31 | 2012-02-21 | At&T Intellectual Property I, L.P. | Methods and apparatus to dynamically control connectivity within virtual private networks |
US8929367B2 (en) | 2008-10-31 | 2015-01-06 | At&T Intellectual Property I, L.P. | Methods and apparatus to dynamically control connectivity within virtual private networks |
US20100111093A1 (en) * | 2008-10-31 | 2010-05-06 | Michael Satterlee | Methods and apparatus to dynamically control connectivity within virtual private networks |
US8549616B2 (en) * | 2008-10-31 | 2013-10-01 | At&T Intellectual Property I, L.P. | Methods and apparatus to dynamically control access from virtual private networks to network-based shared resources |
US9137109B2 (en) | 2008-10-31 | 2015-09-15 | At&T Intellectual Property I, L.P. | Methods and apparatus to dynamically control connectivity within virtual private networks |
US9401844B2 (en) | 2008-10-31 | 2016-07-26 | At&T Intellectual Property I, L.P. | Methods and apparatus to dynamically control connectivity within virtual private networks |
US20100150153A1 (en) * | 2008-12-17 | 2010-06-17 | At&T Intellectual Property I, L.P. | End user circuit diversity auditing methods |
US7813344B2 (en) * | 2008-12-17 | 2010-10-12 | At&T Intellectual Property I, Lp | End user circuit diversity auditing methods |
US9576140B1 (en) | 2009-07-01 | 2017-02-21 | Dell Products L.P. | Single sign-on system for shared resource environments |
US8255984B1 (en) | 2009-07-01 | 2012-08-28 | Quest Software, Inc. | Single sign-on system for shared resource environments |
US9219679B2 (en) | 2009-12-07 | 2015-12-22 | Amazon Technologies, Inc. | Using virtual networking devices to manage routing cost information |
US11870644B2 (en) | 2009-12-07 | 2024-01-09 | Amazon Technologies, Inc. | Exchange of routing information to support virtual computer networks hosted on telecommunications infrastructure network |
US9998335B2 (en) | 2009-12-07 | 2018-06-12 | Amazon Technologies, Inc. | Emulating virtual router device functionality in virtual computer networks |
US9722871B2 (en) | 2009-12-07 | 2017-08-01 | Amazon Technologies, Inc. | Using virtual networking devices and routing information to associate network addresses with computing nodes |
US9769021B2 (en) | 2009-12-07 | 2017-09-19 | Amazon Technologies, Inc. | Using virtual networking devices to manage routing cost information |
US11516080B2 (en) | 2009-12-07 | 2022-11-29 | Amazon Technologies, Inc. | Using virtual networking devices and routing information to associate network addresses with computing nodes |
US8995301B1 (en) | 2009-12-07 | 2015-03-31 | Amazon Technologies, Inc. | Using virtual networking devices to manage routing cost information |
US9210041B1 (en) | 2009-12-07 | 2015-12-08 | Amazon Technologies, Inc. | Using virtual networking devices to manage network configuration |
US9203747B1 (en) | 2009-12-07 | 2015-12-01 | Amazon Technologies, Inc. | Providing virtual networking device functionality for managed computer networks |
US8392608B1 (en) | 2009-12-07 | 2013-03-05 | Amazon Technologies, Inc. | Using virtual networking devices to manage network configuration |
US9036504B1 (en) | 2009-12-07 | 2015-05-19 | Amazon Technologies, Inc. | Using virtual networking devices and routing information to associate network addresses with computing nodes |
US10419287B2 (en) | 2009-12-07 | 2019-09-17 | Amazon Technologies, Inc. | Using virtual networking devices and routing information to associate network addresses with computing nodes |
US10868723B2 (en) | 2009-12-07 | 2020-12-15 | Amazon Technologies, Inc. | Using virtual networking devices and routing information to associate network addresses with computing nodes |
US10225146B2 (en) | 2009-12-07 | 2019-03-05 | Amazon Technologies, Inc. | Using virtual networking devices to manage routing information |
US9900214B2 (en) | 2009-12-07 | 2018-02-20 | Amazon Technologies, Inc. | Using virtual networking devices to manage network configuration |
US8705513B2 (en) | 2009-12-15 | 2014-04-22 | At&T Intellectual Property I, L.P. | Methods and apparatus to communicatively couple virtual private networks to virtual machines within distributive computing networks |
US20110142053A1 (en) * | 2009-12-15 | 2011-06-16 | Jacobus Van Der Merwe | Methods and apparatus to communicatively couple virtual private networks to virtual machines within distributive computing networks |
US9467398B2 (en) | 2009-12-28 | 2016-10-11 | Amazon Technologies, Inc. | Using virtual networking devices to connect managed computer networks |
US9094421B1 (en) | 2009-12-28 | 2015-07-28 | Amazon Technologies, Inc. | Using virtual networking devices to connect managed computer networks |
US8312129B1 (en) | 2009-12-28 | 2012-11-13 | Amazon Technologies, Inc. | Using virtual networking devices to connect managed computer networks |
US9577876B2 (en) | 2009-12-28 | 2017-02-21 | Amazon Technologies, Inc. | Using virtual networking devices to manage routing communications between connected computer networks |
US9137102B1 (en) | 2009-12-28 | 2015-09-15 | Amazon Technologies, Inc. | Using virtual networking devices to manage routing communications between connected computer networks |
US9497040B1 (en) | 2009-12-28 | 2016-11-15 | Amazon Technologies, Inc. | Using virtual networking devices and routing information to initiate external actions |
US8224971B1 (en) * | 2009-12-28 | 2012-07-17 | Amazon Technologies, Inc. | Using virtual networking devices and routing information to initiate external actions |
US8370488B1 (en) | 2009-12-28 | 2013-02-05 | Amazon Technologies, Inc. | Using virtual networking devices to manage routing communications between connected computer networks |
US8473557B2 (en) | 2010-08-24 | 2013-06-25 | At&T Intellectual Property I, L.P. | Methods and apparatus to migrate virtual machines between distributive computing networks across a wide area network |
US8856255B2 (en) | 2010-08-24 | 2014-10-07 | At&T Intellectual Property I, L.P. | Methods and apparatus to migrate virtual machines between distributive computing networks across a wide area network |
US20120110655A1 (en) * | 2010-10-29 | 2012-05-03 | Hon Hai Precision Industry Co., Ltd. | Data transmission management server and method |
CN102457393A (en) * | 2010-10-29 | 2012-05-16 | 鸿富锦精密工业(深圳)有限公司 | Data transmission management equipment and method |
US8464331B2 (en) * | 2010-10-29 | 2013-06-11 | Hon Hai Precision Industry Co., Ltd. | Data transmission management server and method |
US9432258B2 (en) | 2011-06-06 | 2016-08-30 | At&T Intellectual Property I, L.P. | Methods and apparatus to configure virtual private mobile networks to reduce latency |
US10419992B2 (en) | 2011-06-06 | 2019-09-17 | At&T Intellectual Property I, L.P. | Methods and apparatus to migrate a mobile device from a first virtual private mobile network to a second virtual private mobile network to reduce latency |
US9386035B2 (en) | 2011-06-21 | 2016-07-05 | At&T Intellectual Property I, L.P. | Methods and apparatus to configure virtual private mobile networks for security |
US10069799B2 (en) | 2011-06-21 | 2018-09-04 | At&T Intellectual Property I, L.P. | Methods and apparatus to configure virtual private mobile networks for security |
US10044678B2 (en) | 2011-08-31 | 2018-08-07 | At&T Intellectual Property I, L.P. | Methods and apparatus to configure virtual private mobile networks with virtual private networks |
US10205756B2 (en) * | 2012-10-10 | 2019-02-12 | International Business Machines Corporation | Dynamic virtual private network |
US20170063800A1 (en) * | 2012-10-10 | 2017-03-02 | International Business Machines Corporation | Dynamic virtual private network |
US10326801B2 (en) | 2013-02-05 | 2019-06-18 | Fortinet, Inc. | Cloud-based security policy configuration |
US9825992B2 (en) | 2013-02-05 | 2017-11-21 | Fortinet, Inc. | Cloud-based security policy configuration |
US9413724B2 (en) | 2013-02-05 | 2016-08-09 | Fortinet, Inc. | Cloud-based security policy configuration |
US9397922B1 (en) * | 2013-02-28 | 2016-07-19 | EarthLink, LLC | Automated network testing platform |
US20160044000A1 (en) * | 2014-08-05 | 2016-02-11 | Fireeye, Inc. | System and method to communicate sensitive information via one or more untrusted intermediate nodes with resilience to disconnected network topology |
US9912644B2 (en) * | 2014-08-05 | 2018-03-06 | Fireeye, Inc. | System and method to communicate sensitive information via one or more untrusted intermediate nodes with resilience to disconnected network topology |
US20160173528A1 (en) * | 2014-12-15 | 2016-06-16 | Guide Wang | Safe input browser, operation method thereof, and computer system having the safe input browser |
US9900345B2 (en) * | 2014-12-15 | 2018-02-20 | Guide Wang | Safe input browser, operation method thereof, and computer system having the safe input browser |
US9906561B2 (en) | 2015-08-28 | 2018-02-27 | Nicira, Inc. | Performing logical segmentation based on remote device attributes |
CN107925589B (en) * | 2015-08-28 | 2021-08-24 | Nicira股份有限公司 | Method and medium for processing remote device data messages entering a logical overlay network |
US10051002B2 (en) | 2015-08-28 | 2018-08-14 | Nicira, Inc. | Distributed VPN gateway for processing remote device management attribute based rules |
US20170064749A1 (en) * | 2015-08-28 | 2017-03-02 | Nicira, Inc. | Associating Service Tags with Remote Data Message Flows Based on Remote Device Management Attributes |
CN107925589A (en) * | 2015-08-28 | 2018-04-17 | Nicira股份有限公司 | Remote device management attribute is distributed to service node for service regulation processing |
US9860279B2 (en) | 2015-08-28 | 2018-01-02 | Nicira, Inc. | Defining network rules based on remote device management attributes |
US9906562B2 (en) * | 2015-08-28 | 2018-02-27 | Nicira, Inc. | Associating service tags with remote data message flows based on remote device management attributes |
US10397275B2 (en) | 2015-08-28 | 2019-08-27 | Nicira, Inc. | Creating and using remote device management attribute rule data store |
US9894103B2 (en) | 2015-08-28 | 2018-02-13 | Nicira, Inc. | Performing source network address translation based on remote device management attributes |
US9906560B2 (en) | 2015-08-28 | 2018-02-27 | Nicira, Inc. | Distributing remote device management attributes to service nodes for service rule processing |
US10341297B2 (en) * | 2015-12-18 | 2019-07-02 | Nicira, Inc. | Datapath processing of service rules with qualifiers defined in terms of template identifiers and/or template matching criteria |
US10305858B2 (en) * | 2015-12-18 | 2019-05-28 | Nicira, Inc. | Datapath processing of service rules with qualifiers defined in terms of dynamic groups |
US20170180319A1 (en) * | 2015-12-18 | 2017-06-22 | Nicira, Inc. | Datapath processing of service rules with qualifiers defined in terms of template identifiers and/or template matching criteria |
US10148696B2 (en) | 2015-12-18 | 2018-12-04 | Nicira, Inc. | Service rule console for creating, viewing and updating template based service rules |
US10469450B2 (en) | 2015-12-18 | 2019-11-05 | Nicira, Inc. | Creating and distributing template based service rules |
US20170180321A1 (en) * | 2015-12-18 | 2017-06-22 | Nicira, Inc. | Datapath processing of service rules with qualifiers defined in terms of dynamic groups |
US10904217B2 (en) | 2018-05-31 | 2021-01-26 | Cisco Technology, Inc. | Encryption for gateway tunnel-based VPNs independent of wan transport addresses |
US20220070023A1 (en) * | 2020-09-01 | 2022-03-03 | Ricoh Company, Ltd. | Communication system, vpn termination device, and storage medium |
US11711239B2 (en) * | 2020-09-01 | 2023-07-25 | Ricoh Company, Ltd. | Communication system, VPN termination device, and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6079020A (en) | Method and apparatus for managing a virtual private network | |
US6154839A (en) | Translating packet addresses based upon a user identifier | |
US6226751B1 (en) | Method and apparatus for configuring a virtual private network | |
US6175917B1 (en) | Method and apparatus for swapping a computer operating system | |
US7617527B2 (en) | Architecture for virtual private networks | |
EP1145519B1 (en) | System and method for policy-based network management of virtual private networks | |
EP0990206B1 (en) | Multilayer firewall system | |
EP1143663B1 (en) | System and method for selective LDAP database synchronisation | |
EP1712056B1 (en) | Tunneled security groups | |
US6823462B1 (en) | Virtual private network with multiple tunnels associated with one group name | |
US7536715B2 (en) | Distributed firewall system and method | |
US20020083344A1 (en) | Integrated intelligent inter/intra networking device | |
US20040093492A1 (en) | Virtual private network management with certificates | |
US20060153192A1 (en) | Network host isolation tool | |
US10868792B2 (en) | Configuration of sub-interfaces to enable communication with external network devices | |
US10795912B2 (en) | Synchronizing a forwarding database within a high-availability cluster | |
US11297037B2 (en) | Method and network device for overlay tunnel termination and mirroring spanning datacenters | |
Nessett et al. | The multilayer firewall | |
Jamhour | Distributed security management using LDAP directories |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: VPNET TECHNOLOGIES, INC., CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:LIU, QUENTIN C.;REEL/FRAME:008965/0421 Effective date: 19980127 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
AS | Assignment |
Owner name: BANK OF NEW YORK, THE, NEW YORK Free format text: SECURITY AGREEMENT;ASSIGNOR:AVAYA TECHNOLOGY CORP.;REEL/FRAME:012775/0144 Effective date: 20020405 |
|
FEPP | Fee payment procedure |
Free format text: PAT HOLDER NO LONGER CLAIMS SMALL ENTITY STATUS, ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: STOL); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
REFU | Refund |
Free format text: REFUND - SURCHARGE, PETITION TO ACCEPT PYMT AFTER EXP, UNINTENTIONAL (ORIGINAL EVENT CODE: R2551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
FPAY | Fee payment |
Year of fee payment: 4 |
|
FPAY | Fee payment |
Year of fee payment: 8 |
|
AS | Assignment |
Owner name: CITIBANK, N.A., AS ADMINISTRATIVE AGENT, NEW YORK Free format text: SECURITY AGREEMENT;ASSIGNORS:AVAYA, INC.;AVAYA TECHNOLOGY LLC;OCTEL COMMUNICATIONS LLC;AND OTHERS;REEL/FRAME:020156/0149 Effective date: 20071026 Owner name: CITIBANK, N.A., AS ADMINISTRATIVE AGENT,NEW YORK Free format text: SECURITY AGREEMENT;ASSIGNORS:AVAYA, INC.;AVAYA TECHNOLOGY LLC;OCTEL COMMUNICATIONS LLC;AND OTHERS;REEL/FRAME:020156/0149 Effective date: 20071026 |
|
AS | Assignment |
Owner name: CITICORP USA, INC., AS ADMINISTRATIVE AGENT, NEW Y Free format text: SECURITY AGREEMENT;ASSIGNORS:AVAYA, INC.;AVAYA TECHNOLOGY LLC;OCTEL COMMUNICATIONS LLC;AND OTHERS;REEL/FRAME:020166/0705 Effective date: 20071026 Owner name: CITICORP USA, INC., AS ADMINISTRATIVE AGENT, NEW YORK Free format text: SECURITY AGREEMENT;ASSIGNORS:AVAYA, INC.;AVAYA TECHNOLOGY LLC;OCTEL COMMUNICATIONS LLC;AND OTHERS;REEL/FRAME:020166/0705 Effective date: 20071026 Owner name: CITICORP USA, INC., AS ADMINISTRATIVE AGENT,NEW YO Free format text: SECURITY AGREEMENT;ASSIGNORS:AVAYA, INC.;AVAYA TECHNOLOGY LLC;OCTEL COMMUNICATIONS LLC;AND OTHERS;REEL/FRAME:020166/0705 Effective date: 20071026 |
|
FEPP | Fee payment procedure |
Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
AS | Assignment |
Owner name: AVAYA INC, NEW JERSEY Free format text: REASSIGNMENT;ASSIGNOR:AVAYA TECHNOLOGY LLC;REEL/FRAME:021158/0300 Effective date: 20080625 |
|
AS | Assignment |
Owner name: AVAYA TECHNOLOGY LLC, NEW JERSEY Free format text: CONVERSION FROM CORP TO LLC;ASSIGNOR:AVAYA TECHNOLOGY CORP.;REEL/FRAME:022071/0420 Effective date: 20051004 |
|
FEPP | Fee payment procedure |
Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Free format text: PAYER NUMBER DE-ASSIGNED (ORIGINAL EVENT CODE: RMPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
AS | Assignment |
Owner name: BANK OF NEW YORK MELLON TRUST, NA, AS NOTES COLLATERAL AGENT, THE, PENNSYLVANIA Free format text: SECURITY AGREEMENT;ASSIGNOR:AVAYA INC., A DELAWARE CORPORATION;REEL/FRAME:025863/0535 Effective date: 20110211 Owner name: BANK OF NEW YORK MELLON TRUST, NA, AS NOTES COLLAT Free format text: SECURITY AGREEMENT;ASSIGNOR:AVAYA INC., A DELAWARE CORPORATION;REEL/FRAME:025863/0535 Effective date: 20110211 |
|
FPAY | Fee payment |
Year of fee payment: 12 |
|
AS | Assignment |
Owner name: BANK OF NEW YORK MELLON TRUST COMPANY, N.A., THE, PENNSYLVANIA Free format text: SECURITY AGREEMENT;ASSIGNOR:AVAYA, INC.;REEL/FRAME:030083/0639 Effective date: 20130307 Owner name: BANK OF NEW YORK MELLON TRUST COMPANY, N.A., THE, Free format text: SECURITY AGREEMENT;ASSIGNOR:AVAYA, INC.;REEL/FRAME:030083/0639 Effective date: 20130307 |
|
AS | Assignment |
Owner name: CITIBANK, N.A., AS ADMINISTRATIVE AGENT, NEW YORK Free format text: SECURITY INTEREST;ASSIGNORS:AVAYA INC.;AVAYA INTEGRATED CABINET SOLUTIONS INC.;OCTEL COMMUNICATIONS CORPORATION;AND OTHERS;REEL/FRAME:041576/0001 Effective date: 20170124 |
|
AS | Assignment |
Owner name: OCTEL COMMUNICATIONS LLC (FORMERLY KNOWN AS OCTEL COMMUNICATIONS CORPORATION), CALIFORNIA Free format text: BANKRUPTCY COURT ORDER RELEASING ALL LIENS INCLUDING THE SECURITY INTEREST RECORDED AT REEL/FRAME 041576/0001;ASSIGNOR:CITIBANK, N.A.;REEL/FRAME:044893/0531 Effective date: 20171128 Owner name: AVAYA INTEGRATED CABINET SOLUTIONS INC., CALIFORNIA Free format text: BANKRUPTCY COURT ORDER RELEASING ALL LIENS INCLUDING THE SECURITY INTEREST RECORDED AT REEL/FRAME 041576/0001;ASSIGNOR:CITIBANK, N.A.;REEL/FRAME:044893/0531 Effective date: 20171128 Owner name: AVAYA INC., CALIFORNIA Free format text: BANKRUPTCY COURT ORDER RELEASING ALL LIENS INCLUDING THE SECURITY INTEREST RECORDED AT REEL/FRAME 025863/0535;ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST, NA;REEL/FRAME:044892/0001 Effective date: 20171128 Owner name: AVAYA INC., CALIFORNIA Free format text: BANKRUPTCY COURT ORDER RELEASING ALL LIENS INCLUDING THE SECURITY INTEREST RECORDED AT REEL/FRAME 041576/0001;ASSIGNOR:CITIBANK, N.A.;REEL/FRAME:044893/0531 Effective date: 20171128 Owner name: AVAYA INTEGRATED CABINET SOLUTIONS INC., CALIFORNI Free format text: BANKRUPTCY COURT ORDER RELEASING ALL LIENS INCLUDING THE SECURITY INTEREST RECORDED AT REEL/FRAME 041576/0001;ASSIGNOR:CITIBANK, N.A.;REEL/FRAME:044893/0531 Effective date: 20171128 Owner name: AVAYA INC. (FORMERLY KNOWN AS AVAYA TECHNOLOGY COR Free format text: BANKRUPTCY COURT ORDER RELEASING ALL LIENS INCLUDING THE SECURITY INTEREST RECORDED AT REEL/FRAME 012775/0144;ASSIGNOR:THE BANK OF NEW YORK;REEL/FRAME:044893/0179 Effective date: 20171128 Owner name: OCTEL COMMUNICATIONS LLC (FORMERLY KNOWN AS OCTEL Free format text: BANKRUPTCY COURT ORDER RELEASING ALL LIENS INCLUDING THE SECURITY INTEREST RECORDED AT REEL/FRAME 041576/0001;ASSIGNOR:CITIBANK, N.A.;REEL/FRAME:044893/0531 Effective date: 20171128 Owner name: VPNET TECHNOLOGIES, INC., CALIFORNIA Free format text: BANKRUPTCY COURT ORDER RELEASING ALL LIENS INCLUDING THE SECURITY INTEREST RECORDED AT REEL/FRAME 041576/0001;ASSIGNOR:CITIBANK, N.A.;REEL/FRAME:044893/0531 Effective date: 20171128 Owner name: AVAYA INC., CALIFORNIA Free format text: BANKRUPTCY COURT ORDER RELEASING ALL LIENS INCLUDING THE SECURITY INTEREST RECORDED AT REEL/FRAME 030083/0639;ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A.;REEL/FRAME:045012/0666 Effective date: 20171128 |
|
AS | Assignment |
Owner name: AVAYA TECHNOLOGY, LLC, NEW JERSEY Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CITICORP USA, INC.;REEL/FRAME:045032/0213 Effective date: 20171215 Owner name: AVAYA, INC., CALIFORNIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CITICORP USA, INC.;REEL/FRAME:045032/0213 Effective date: 20171215 Owner name: SIERRA HOLDINGS CORP., NEW JERSEY Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CITICORP USA, INC.;REEL/FRAME:045032/0213 Effective date: 20171215 Owner name: VPNET TECHNOLOGIES, INC., NEW JERSEY Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CITICORP USA, INC.;REEL/FRAME:045032/0213 Effective date: 20171215 Owner name: OCTEL COMMUNICATIONS LLC, CALIFORNIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CITICORP USA, INC.;REEL/FRAME:045032/0213 Effective date: 20171215 |
|
AS | Assignment |
Owner name: GOLDMAN SACHS BANK USA, AS COLLATERAL AGENT, NEW YORK Free format text: SECURITY INTEREST;ASSIGNORS:AVAYA INC.;AVAYA INTEGRATED CABINET SOLUTIONS LLC;OCTEL COMMUNICATIONS LLC;AND OTHERS;REEL/FRAME:045034/0001 Effective date: 20171215 Owner name: GOLDMAN SACHS BANK USA, AS COLLATERAL AGENT, NEW Y Free format text: SECURITY INTEREST;ASSIGNORS:AVAYA INC.;AVAYA INTEGRATED CABINET SOLUTIONS LLC;OCTEL COMMUNICATIONS LLC;AND OTHERS;REEL/FRAME:045034/0001 Effective date: 20171215 |
|
AS | Assignment |
Owner name: CITIBANK, N.A., AS COLLATERAL AGENT, NEW YORK Free format text: SECURITY INTEREST;ASSIGNORS:AVAYA INC.;AVAYA INTEGRATED CABINET SOLUTIONS LLC;OCTEL COMMUNICATIONS LLC;AND OTHERS;REEL/FRAME:045124/0026 Effective date: 20171215 |
|
AS | Assignment |
Owner name: AVAYA INTEGRATED CABINET SOLUTIONS LLC, NEW JERSEY Free format text: RELEASE OF SECURITY INTEREST IN PATENTS AT REEL 45124/FRAME 0026;ASSIGNOR:CITIBANK, N.A., AS COLLATERAL AGENT;REEL/FRAME:063457/0001 Effective date: 20230403 Owner name: AVAYA MANAGEMENT L.P., NEW JERSEY Free format text: RELEASE OF SECURITY INTEREST IN PATENTS AT REEL 45124/FRAME 0026;ASSIGNOR:CITIBANK, N.A., AS COLLATERAL AGENT;REEL/FRAME:063457/0001 Effective date: 20230403 Owner name: AVAYA INC., NEW JERSEY Free format text: RELEASE OF SECURITY INTEREST IN PATENTS AT REEL 45124/FRAME 0026;ASSIGNOR:CITIBANK, N.A., AS COLLATERAL AGENT;REEL/FRAME:063457/0001 Effective date: 20230403 Owner name: AVAYA HOLDINGS CORP., NEW JERSEY Free format text: RELEASE OF SECURITY INTEREST IN PATENTS AT REEL 45124/FRAME 0026;ASSIGNOR:CITIBANK, N.A., AS COLLATERAL AGENT;REEL/FRAME:063457/0001 Effective date: 20230403 |
|
AS | Assignment |
Owner name: AVAYA MANAGEMENT L.P., NEW JERSEY Free format text: RELEASE OF SECURITY INTEREST IN PATENTS (REEL/FRAME 045034/0001);ASSIGNOR:GOLDMAN SACHS BANK USA., AS COLLATERAL AGENT;REEL/FRAME:063779/0622 Effective date: 20230501 Owner name: CAAS TECHNOLOGIES, LLC, NEW JERSEY Free format text: RELEASE OF SECURITY INTEREST IN PATENTS (REEL/FRAME 045034/0001);ASSIGNOR:GOLDMAN SACHS BANK USA., AS COLLATERAL AGENT;REEL/FRAME:063779/0622 Effective date: 20230501 Owner name: HYPERQUALITY II, LLC, NEW JERSEY Free format text: RELEASE OF SECURITY INTEREST IN PATENTS (REEL/FRAME 045034/0001);ASSIGNOR:GOLDMAN SACHS BANK USA., AS COLLATERAL AGENT;REEL/FRAME:063779/0622 Effective date: 20230501 Owner name: HYPERQUALITY, INC., NEW JERSEY Free format text: RELEASE OF SECURITY INTEREST IN PATENTS (REEL/FRAME 045034/0001);ASSIGNOR:GOLDMAN SACHS BANK USA., AS COLLATERAL AGENT;REEL/FRAME:063779/0622 Effective date: 20230501 Owner name: ZANG, INC. (FORMER NAME OF AVAYA CLOUD INC.), NEW JERSEY Free format text: RELEASE OF SECURITY INTEREST IN PATENTS (REEL/FRAME 045034/0001);ASSIGNOR:GOLDMAN SACHS BANK USA., AS COLLATERAL AGENT;REEL/FRAME:063779/0622 Effective date: 20230501 Owner name: VPNET TECHNOLOGIES, INC., NEW JERSEY Free format text: RELEASE OF SECURITY INTEREST IN PATENTS (REEL/FRAME 045034/0001);ASSIGNOR:GOLDMAN SACHS BANK USA., AS COLLATERAL AGENT;REEL/FRAME:063779/0622 Effective date: 20230501 Owner name: OCTEL COMMUNICATIONS LLC, NEW JERSEY Free format text: RELEASE OF SECURITY INTEREST IN PATENTS (REEL/FRAME 045034/0001);ASSIGNOR:GOLDMAN SACHS BANK USA., AS COLLATERAL AGENT;REEL/FRAME:063779/0622 Effective date: 20230501 Owner name: AVAYA INTEGRATED CABINET SOLUTIONS LLC, NEW JERSEY Free format text: RELEASE OF SECURITY INTEREST IN PATENTS (REEL/FRAME 045034/0001);ASSIGNOR:GOLDMAN SACHS BANK USA., AS COLLATERAL AGENT;REEL/FRAME:063779/0622 Effective date: 20230501 Owner name: INTELLISIST, INC., NEW JERSEY Free format text: RELEASE OF SECURITY INTEREST IN PATENTS (REEL/FRAME 045034/0001);ASSIGNOR:GOLDMAN SACHS BANK USA., AS COLLATERAL AGENT;REEL/FRAME:063779/0622 Effective date: 20230501 Owner name: AVAYA INC., NEW JERSEY Free format text: RELEASE OF SECURITY INTEREST IN PATENTS (REEL/FRAME 045034/0001);ASSIGNOR:GOLDMAN SACHS BANK USA., AS COLLATERAL AGENT;REEL/FRAME:063779/0622 Effective date: 20230501 |